MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 009d58f95f59dc6d9755e988ce47420d1c2a239de89b5631df0303301c6eba68. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 16
| SHA256 hash: | 009d58f95f59dc6d9755e988ce47420d1c2a239de89b5631df0303301c6eba68 |
|---|---|
| SHA3-384 hash: | 31c668500dfa8eb34749009431aa856d9aaf3dcca05fa4923b0dc157d84494768a8ec28c47ce76a4be9dc0817b28f967 |
| SHA1 hash: | c18a81f956fa94725f7e012d3ab7a0c5f5981ff7 |
| MD5 hash: | 97e3b987724c4a6df897694167fb972c |
| humanhash: | minnesota-ink-nineteen-freddie |
| File name: | file |
| Download: | download sample |
| Signature | Stealc |
| File size: | 2'177'369 bytes |
| First seen: | 2024-03-18 22:13:17 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 187b3ae62ff818788b8c779ef7bc3d1c (14 x Stealc, 1 x GCleaner) |
| ssdeep | 49152:LT0OJT1frbck6hKwwT/cAjNNp9j2tWmvaVpmr8:vJTdoZo5bpNVj2tWomm4 |
| Threatray | 31 similar samples on MalwareBazaar |
| TLSH | T126A5230DB493AD76DD0201744C43E6FE5A30AE31DE688A47F1C06E6BFDB2EA69352741 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| File icon (PE): | |
| dhash icon | 4a8d250d192b3655 (1 x Stealc, 1 x GCleaner) |
| Reporter | |
| Tags: | exe Stealc |
Intelligence
File Origin
# of uploads :
1
# of downloads :
487
Origin country :
USVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
009d58f95f59dc6d9755e988ce47420d1c2a239de89b5631df0303301c6eba68.exe
Verdict:
Malicious activity
Analysis date:
2024-03-18 22:13:52 UTC
Tags:
stealer stealc loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a window
Sending an HTTP GET request to an infection source
Сreating synchronization primitives
Connecting to a non-recommended domain
Connection attempt
Sending an HTTP GET request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a process
Connection attempt to an infection source
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
installer lolbin overlay packed shell32
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Stealc
Verdict:
Malicious
Result
Threat name:
Mars Stealer, Stealc, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious names
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: New RUN Key Pointing to Suspicious Folder
Snort IDS alert for network traffic
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Mars stealer
Yara detected Stealc
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.VidarStealer
Status:
Malicious
First seen:
2024-03-18 07:33:12 UTC
File Type:
PE (Exe)
Extracted files:
242
AV detection:
21 of 24 (87.50%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 21 additional samples on MalwareBazaar
Result
Malware family:
stealc
Score:
10/10
Tags:
family:stealc discovery persistence spyware stealer upx
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
UPX packed file
Downloads MZ/PE file
Stealc
Malware Config
C2 Extraction:
http://185.172.128.145
Unpacked files
SH256 hash:
8ff4e509a48d6cbcff5d325fc08ab97f37f69e5fa36fad427216b38545941661
MD5 hash:
7faf9f4744ac9a3680a6ea32ab352138
SHA1 hash:
4ec9a4769b6dccbb1a6017d08a36effc0117abe2
SH256 hash:
4cc18950f5f63698850234e908b5aa158ac33cefcc01c656995a483c9b0340e4
MD5 hash:
4ede5aead6a7a91f4fc86d56c0a86751
SHA1 hash:
5eab867acfba66409012ed6a5c9852813930a199
Detections:
stealc
win_stealc_auto
Parent samples :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 hash:
5fee0cbb56fcc342096e780044752cffd00f12db5f3f9b0c9b836aec876b8036
MD5 hash:
7e4d1605c70c59de5227e3d5659eb695
SHA1 hash:
b96a7f558bbb469807964b623b99824fe8fbec91
SH256 hash:
2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
MD5 hash:
2b342079303895c50af8040a91f30f71
SHA1 hash:
b11335e1cb8356d9c337cb89fe81d669a69de17e
SH256 hash:
6840556b731cc8fccccbbf9e25c232b0391908632cf5269b0e3fc5bc67490ed4
MD5 hash:
31ceb4ea8e739e5195aa6060b5789c30
SHA1 hash:
ee6731bef6064c8ced3850a91cb32dfaa48f8677
SH256 hash:
009d58f95f59dc6d9755e988ce47420d1c2a239de89b5631df0303301c6eba68
MD5 hash:
97e3b987724c4a6df897694167fb972c
SHA1 hash:
c18a81f956fa94725f7e012d3ab7a0c5f5981ff7
Malware family:
Stealc
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Dropped by
Amadey
Delivery method
Distributed via web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteA SHELL32.dll::SHFileOperationA SHELL32.dll::SHGetFileInfoA |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateProcessA KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::LoadLibraryExA KERNEL32.dll::GetDiskFreeSpaceA KERNEL32.dll::GetCommandLineA |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileA KERNEL32.dll::CreateDirectoryA KERNEL32.dll::CreateFileA KERNEL32.dll::DeleteFileA KERNEL32.dll::MoveFileA ADVAPI32.dll::SetFileSecurityA |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegCreateKeyExA ADVAPI32.dll::RegDeleteKeyA ADVAPI32.dll::RegOpenKeyExA ADVAPI32.dll::RegQueryValueExA ADVAPI32.dll::RegSetValueExA |
| WIN_USER_API | Performs GUI Actions | USER32.dll::AppendMenuA USER32.dll::EmptyClipboard USER32.dll::FindWindowExA USER32.dll::OpenClipboard USER32.dll::PeekMessageA USER32.dll::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.