MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 18


Intelligence 18 IOCs YARA 4 File information Comments

SHA256 hash: 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d
SHA3-384 hash: 41e122e03e1fc2b11fa2f650416a3cd84b72cce459414bc641a8ba488f65dd12d77e6b8dd6d0f220bd2399060449c318
SHA1 hash: d597f7ec6f9309af338b0bbb2234f9a0a5ca1a92
MD5 hash: fcc5c005c3ccbddee8bee4dc5ca441e2
humanhash: maryland-yankee-nevada-sad
File name:04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d
Download: download sample
Signature Stealc
File size:7'199'744 bytes
First seen:2024-12-09 16:40:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 196608:qZjdOmZw7qclSdCdbM8evA0U4YJtJq8Y4KM:Ej1ZwOcniTA02Bl
Threatray 1 similar samples on MalwareBazaar
TLSH T1E37633033BE8DC43E8B8337268F5C6D36A77BE61313501A57BCAB8644D31A657A4235B
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10522/11/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
Magika pebin
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter JAMESWT_WT
Tags:185-215-113-16 atten-supporse-biz exe Stealc

Intelligence


File Origin
# of uploads :
1
# of downloads :
362
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d
Verdict:
Malicious activity
Analysis date:
2024-12-09 16:42:48 UTC
Tags:
lumma stealer amadey botnet loader darkvision remote miner themida stealc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect autorun emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Searching for analyzing tools
Creating a file
Creating a window
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Running batch commands
Launching a process
Connection attempt to an infection source
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-vm CAB explorer installer lolbin microsoft_visual_cc packed packed packer_detected rundll32 runonce sfx zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Credential Flusher, LummaC Steal
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Excessive usage of taskkill to terminate processes
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Amadeys stealer DLL
Yara detected Credential Flusher
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Stealc
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1571788 Sample: SJqOoILabX.exe Startdate: 09/12/2024 Architecture: WINDOWS Score: 100 105 youtube.com 2->105 107 www.google.com 2->107 109 22 other IPs or domains 2->109 153 Suricata IDS alerts for network traffic 2->153 155 Found malware configuration 2->155 157 Malicious sample detected (through community Yara rule) 2->157 159 18 other signatures 2->159 10 skotes.exe 4 32 2->10         started        15 SJqOoILabX.exe 1 4 2->15         started        17 2d63241b6b.exe 2->17         started        19 8 other processes 2->19 signatures3 process4 dnsIp5 113 185.215.113.43, 49739, 49741, 49759 WHOLESALECONNECTIONSNL Portugal 10->113 115 185.215.113.16, 49743, 49766, 49790 WHOLESALECONNECTIONSNL Portugal 10->115 117 31.41.244.11, 49851, 80 AEROEXPRESS-ASRU Russian Federation 10->117 87 C:\Users\user\AppData\...\d6a99bd802.exe, PE32 10->87 dropped 89 C:\Users\user\AppData\...\974529527f.exe, PE32 10->89 dropped 91 C:\Users\user\AppData\...\eeb0f3967c.exe, PE32 10->91 dropped 97 8 other malicious files 10->97 dropped 201 Creates multiple autostart registry keys 10->201 203 Hides threads from debuggers 10->203 205 Tries to detect sandboxes / dynamic malware analysis system (registry check) 10->205 207 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 10->207 21 2d63241b6b.exe 10->21         started        24 974529527f.exe 10->24         started        26 f7217c71aa.exe 10->26         started        38 3 other processes 10->38 93 C:\Users\user\AppData\Local\...\f4R43.exe, PE32 15->93 dropped 95 C:\Users\user\AppData\Local\...\4U637G.exe, PE32 15->95 dropped 28 f4R43.exe 1 4 15->28         started        209 Query firmware table information (likely to detect VMs) 17->209 211 Tries to harvest and steal ftp login credentials 17->211 213 Tries to harvest and steal browser information (history, passwords, etc) 17->213 215 Found many strings related to Crypto-Wallets (likely being stolen) 19->215 217 Excessive usage of taskkill to terminate processes 19->217 219 Tries to steal Crypto Currency Wallets 19->219 31 firefox.exe 19->31         started        34 taskkill.exe 19->34         started        36 taskkill.exe 19->36         started        40 4 other processes 19->40 file6 signatures7 process8 dnsIp9 161 Query firmware table information (likely to detect VMs) 21->161 163 Tries to detect sandboxes and other dynamic analysis tools (window names) 21->163 165 Found many strings related to Crypto-Wallets (likely being stolen) 21->165 179 2 other signatures 21->179 167 Detected unpacking (changes PE section rights) 24->167 181 4 other signatures 24->181 183 3 other signatures 26->183 99 C:\Users\user\AppData\Local\...\e0b81.exe, PE32 28->99 dropped 101 C:\Users\user\AppData\Local\...\3w55K.exe, PE32 28->101 dropped 169 Antivirus detection for dropped file 28->169 171 Multi AV Scanner detection for dropped file 28->171 173 Machine Learning detection for dropped file 28->173 42 e0b81.exe 1 4 28->42         started        46 3w55K.exe 13 28->46         started        121 youtube.com 142.250.181.78, 443, 49854, 49856 GOOGLEUS United States 31->121 123 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49857, 80 GOOGLEUS United States 31->123 129 5 other IPs or domains 31->129 57 2 other processes 31->57 49 conhost.exe 34->49         started        51 conhost.exe 36->51         started        125 woo097878781.win 154.216.20.243 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 38->125 127 80.82.65.70 INT-NETWORKSC Netherlands 38->127 175 Binary is likely a compiled AutoIt script file 38->175 177 Found API chain indicative of sandbox detection 38->177 185 2 other signatures 38->185 53 taskkill.exe 38->53         started        55 taskkill.exe 38->55         started        59 5 other processes 38->59 61 3 other processes 40->61 file10 signatures11 process12 dnsIp13 83 C:\Users\user\AppData\Local\...\2U9131.exe, PE32 42->83 dropped 85 C:\Users\user\AppData\Local\...\1J17n3.exe, PE32 42->85 dropped 187 Antivirus detection for dropped file 42->187 189 Multi AV Scanner detection for dropped file 42->189 191 Machine Learning detection for dropped file 42->191 63 1J17n3.exe 4 42->63         started        67 2U9131.exe 42->67         started        119 185.215.113.206, 49732, 49789, 49835 WHOLESALECONNECTIONSNL Portugal 46->119 193 Detected unpacking (changes PE section rights) 46->193 195 Tries to evade debugger and weak emulator (self modifying code) 46->195 197 Hides threads from debuggers 46->197 199 2 other signatures 46->199 70 conhost.exe 53->70         started        72 conhost.exe 55->72         started        74 conhost.exe 59->74         started        76 conhost.exe 59->76         started        78 conhost.exe 59->78         started        file14 signatures15 process16 dnsIp17 103 C:\Users\user\AppData\Local\...\skotes.exe, PE32 63->103 dropped 131 Antivirus detection for dropped file 63->131 133 Multi AV Scanner detection for dropped file 63->133 135 Detected unpacking (changes PE section rights) 63->135 143 3 other signatures 63->143 80 skotes.exe 63->80         started        111 atten-supporse.biz 104.21.16.9, 443, 49730, 49731 CLOUDFLARENETUS United States 67->111 137 Machine Learning detection for dropped file 67->137 139 Tries to evade debugger and weak emulator (self modifying code) 67->139 141 Hides threads from debuggers 67->141 file18 signatures19 process20 signatures21 145 Antivirus detection for dropped file 80->145 147 Multi AV Scanner detection for dropped file 80->147 149 Detected unpacking (changes PE section rights) 80->149 151 7 other signatures 80->151
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2024-12-09 01:06:43 UTC
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
amadey lummastealer
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:gcleaner family:lumma family:stealc botnet:9c9aa5 botnet:stok discovery evasion loader persistence stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Identifies Wine through registry keys
Windows security modification
Downloads MZ/PE file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Amadey
Amadey family
GCleaner
Gcleaner family
Lumma Stealer, LummaC
Lumma family
Modifies Windows Defender Real-time Protection settings
Stealc
Stealc family
Malware Config
C2 Extraction:
http://185.215.113.43
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
http://185.215.113.206
Verdict:
Malicious
Tags:
stealer redline Stealer lumma Lumma_Stealer c2 Win.Downloader.Amadey-9986882-0
YARA:
detect_Redline_Stealer win_redline_wextract_hunting_oct_2023
Unpacked files
SH256 hash:
c5741977022e908fbe2c233df25c5d5c6b0b88af01a026acc6085f30793708ef
MD5 hash:
11c23f104d7ecfcb5b535f22214c5dbe
SHA1 hash:
0899ffd81ea3727de16614c5f9e84749f8182552
SH256 hash:
bda24b571a92286e33963d7790a6cada3b23b2d5b8c4099eb7f4922d41df113e
MD5 hash:
99cff6034a2010e18f19281afa021aec
SHA1 hash:
6b045ce6bc1d26d244c083dbc4381c1d38539700
SH256 hash:
572eb5a0090612381f4b880ecda19501e2f9c5fd7b8024261f045c0bcd80b2c7
MD5 hash:
830b2f94e58555d056241e0b528ab9d3
SHA1 hash:
ec96f3b11b653ff3d4db3cfb7d64922080efece8
Detections:
win_stealc_w0 win_stealc_a0
SH256 hash:
051bc4874978102c2179de1ac5b46b39c51bb7c777511eb963212e4103b41d61
MD5 hash:
47267fa7fd6bc43464d6c8be8e86e937
SHA1 hash:
3f1037eadf001531411d1e8bd33a1860f3e1d981
SH256 hash:
21f298a646f80bf5e1a734e5de27e0a8a3cc993f9ad197aaafe1d2f7c2fa14ca
MD5 hash:
451e5ccf387e7911a61c6e746db8dc18
SHA1 hash:
f64cef4d03edc7b9ee1bc45efd8a7a55dfde5bdf
Detections:
Amadey win_amadey
SH256 hash:
04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d
MD5 hash:
fcc5c005c3ccbddee8bee4dc5ca441e2
SHA1 hash:
d597f7ec6f9309af338b0bbb2234f9a0a5ca1a92
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe 04ccac472e7f9760a547e7bbb721c713f00021fcc74a59637c198f4bbee06c2d

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::EqualSid
ADVAPI32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetDriveTypeA
KERNEL32.dll::GetVolumeInformationA
KERNEL32.dll::GetSystemInfo
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileA
KERNEL32.dll::DeleteFileA
KERNEL32.dll::GetWindowsDirectoryA
KERNEL32.dll::GetSystemDirectoryA
KERNEL32.dll::GetFileAttributesA
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExA
ADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegQueryInfoKeyA
ADVAPI32.dll::RegQueryValueExA
ADVAPI32.dll::RegSetValueExA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::PeekMessageA

Comments