Behavioral task
behavioral1
Sample
3428-1-0x00007FF6FA090000-0x00007FF6FA731000-memory.exe
Resource
win10v2004-20250410-en
General
-
Target
3428-1-0x00007FF6FA090000-0x00007FF6FA731000-memory.dmp
-
Size
6.6MB
-
MD5
077197b5f8242d43c82bb65496d446d7
-
SHA1
37f8b3eef06e311792c37bf05a2981f592ed4821
-
SHA256
f7e6a32787e7503e2ce32436b1661af43d5df11586f6378627d79c45cc3807cb
-
SHA512
8342e43c4b8596233bfe301764f671148df7588d96ed9c6f164f642bd73bc55a7d92f8b73f1d7062d184db2ee18286fab57f3933a72187b30cffb65291a7568d
-
SSDEEP
98304:K1RCRN9zoOvMVDjnM4SxF1Wy58cqWaIC/bJWrJV2Aen1:yYRDzB4DjnM4SxFZ51/aRb4rJVF
Malware Config
Extracted
stealc
suka
45.93.20.28
-
url_path
/3d15e67552d448ff.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3428-1-0x00007FF6FA090000-0x00007FF6FA731000-memory.dmp
Files
-
3428-1-0x00007FF6FA090000-0x00007FF6FA731000-memory.dmp.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 312KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tupkkpms Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kbdfseil Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE