Behavioral task
behavioral1
Sample
5668-2-0x00007FF700730000-0x00007FF700DBD000-memory.exe
Resource
win10v2004-20250410-en
General
-
Target
5668-2-0x00007FF700730000-0x00007FF700DBD000-memory.dmp
-
Size
6.6MB
-
MD5
7fa53763993bd9e59b9bb42a7e1c2680
-
SHA1
34753191b4a0496390f99d775dfbee92323a2ad0
-
SHA256
e024d8a717ce2e0584d9975a31fcb83a03c4d5727d5912384198097be63bb599
-
SHA512
937b3e37c5c2d140b24af049e4ff6a5def18235dcc518379cddb794375abf47c7bbb7e8fed73fa91aa72d4cd920e48c67ed15a99be5a12debb268844f2be7f97
-
SSDEEP
98304:dP7Calo3yLdR2/T8e16JRaiWS2pHHYjS/cLosTx80pN:duaa3yLdROT716eRTpYjS/ccCx8W
Malware Config
Extracted
stealc
suka
45.93.20.28
-
url_path
/3d15e67552d448ff.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5668-2-0x00007FF700730000-0x00007FF700DBD000-memory.dmp
Files
-
5668-2-0x00007FF700730000-0x00007FF700DBD000-memory.dmp.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 312KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mnwmwqli Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cvzkijro Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE