MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 024294f22a290e5e1729596c49f2509955f301f29106fe0f67413f7e2a88f2d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 14
| SHA256 hash: | 024294f22a290e5e1729596c49f2509955f301f29106fe0f67413f7e2a88f2d9 |
|---|---|
| SHA3-384 hash: | 740cc12b685caf4d4c597c17438ca4f2e55dc68704b2f6b2cc607ac55eb83afc2aa067b05f28603a400df8eb4220fca6 |
| SHA1 hash: | 5b133899a53375e5d97540fba94a57a065bd8927 |
| MD5 hash: | 6162ac18a404aca27ee981ce4231df59 |
| humanhash: | lake-lima-diet-video |
| File name: | 6162ac18a404aca27ee981ce4231df59.exe |
| Download: | download sample |
| Signature | Stealc |
| File size: | 266'752 bytes |
| First seen: | 2024-05-10 07:45:22 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7728fdfee954e106d39411e9e7e8ccc0 (2 x LummaStealer, 1 x Stealc) |
| ssdeep | 6144:oS/IbfGEBTZIkhQ0/CMAb8zfJXKbTYeJK:XgbJZIk6MjhXwdJK |
| TLSH | T11B44AD216690EC21CF5647338A35C2E46A6ABF6C5B7461BE7244BBCF1973EF0E252305 |
| TrID | 37.3% (.EXE) Win64 Executable (generic) (10523/12/4) 17.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 15.9% (.EXE) Win32 Executable (generic) (4504/4/1) 7.3% (.ICL) Windows Icons Library (generic) (2059/9) 7.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 64d29a9891998989 (1 x Stealc) |
| Reporter | |
| Tags: | exe Stealc |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
6760a4705383711ee29812a1e6f56b8d60c48a5375382025ce98ad4d0f2893ac
52aa0c072e5c7fef19391a933cb34b085bf34d258d3fd7603a99907b262d547d
fc78e8de8a0ef72dba38b06c7f884087a37db530035976a88a230fe0c683c4cc
508baf86ec9cd4c0ed812dfa9cbdd444a14a54de40f50543d71b21b052da72d2
a825b92f75bda1a0ab93970d92a09b91c04ea7cccae4c7524b2fa4aa9108ffbd
7da7503189aac8a6be5b013858eb04b2e4c2e605c0c39b7a19279fca10241261
091f1847e19348057903f9118cbffe6c61eb097deb75ccfd9faa19f4f2566a37
40aafb9123cf17b680ab9bf168950a073d7c1c703af7f61cf3b6ab907ec4244a
2144c4137bde2e41c2cd63b8c509889c33b564f6a9bc40f0c2dfb8edad66026b
d37f54aa31485a49ae8d66d29e1d235cad52c576403da0785b82df6dab97db29
49367aa06446dda922e9fff631a7e35bd85555f5e6554d22728d69c543111b82
dce56b03d138ced62c5137c164d18240efe3e4a084c70547614b657e2049c6af
024294f22a290e5e1729596c49f2509955f301f29106fe0f67413f7e2a88f2d9
7dbf762b2ef2b651a4e8c7b7d9b8996a1de0cfa44119452f1d3f29bfe03dfd86
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleA KERNEL32.dll::WriteConsoleW KERNEL32.dll::SetConsoleScreenBufferSize KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode KERNEL32.dll::GetConsoleOutputCP |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateFileA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.