Behavioral task
behavioral1
Sample
2280-1358-0x0000000000400000-0x0000000000B0C000-memory.exe
Resource
win10v2004-20250313-en
General
-
Target
2280-1358-0x0000000000400000-0x0000000000B0C000-memory.dmp
-
Size
7.0MB
-
MD5
3fab95283488a2555f034df9b59bca30
-
SHA1
3f1bf2a19fdee3690b75a35c4e4f593b83ec882e
-
SHA256
dd3815e010be17fa7fda6a72e5b8873d5968d06ea01c03c784903e2f3c11c26b
-
SHA512
03c9c54cfb370e12eb6041ae29a2681c86549ce0f3b9300b00d28ab1da0887ef22ca273ae1aa4bfef574aad9cd3b213fd04b3e59c12a4aa9796764e1477c34af
-
SSDEEP
196608:JSmuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKN:dA403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
Signatures
-
Stealerium family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2280-1358-0x0000000000400000-0x0000000000B0C000-memory.dmp
Files
-
2280-1358-0x0000000000400000-0x0000000000B0C000-memory.dmp.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 7.0MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ