MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 119e903551a459831af73657fa4478655a8a94febcfbb5f82be19781cdc4a123. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 16


Intelligence 16 IOCs YARA 6 File information Comments

SHA256 hash: 119e903551a459831af73657fa4478655a8a94febcfbb5f82be19781cdc4a123
SHA3-384 hash: 6bf9ec2864c1fc5fdfa3aa27c3f48b28ac64d1a73e02ff515058638b31364e1f26818e51cd6d01d3dac613cd41077027
SHA1 hash: d9af2e07d01c16074428e6715b88f1b7ed3242dd
MD5 hash: b5c0e1a9256d2f592e3fcac9302eaa26
humanhash: angel-dakota-pizza-grey
File name:b5c0e1a9256d2f592e3fcac9302eaa26.exe
Download: download sample
Signature Stealc
File size:271'360 bytes
First seen:2023-10-12 14:40:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 88436ff6acbe52a381a5371266c10c19 (2 x Smoke Loader, 2 x Tofsee, 2 x Stealc)
ssdeep 3072:LjBNZFrvnIPaYv6tF83IbtOIwZMO9uppjVTDUbTmuwzB:RBrvnIPaYv6tF83EtFcMO0ppjRDU/m
Threatray 179 similar samples on MalwareBazaar
TLSH T1E044CF113690D832D5A31E359870C1AA5B7BFCE2E96181CB37943F2E9E322D15A76B07
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
16.0% (.EXE) Win32 Executable (generic) (4505/5/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 70d0dcd0dad9d2dd (1 x Tofsee, 1 x Stealc)
Reporter abuse_ch
Tags:exe Stealc


Avatar
abuse_ch
Stealc C2:
http://elijahdiego.top/e9c345fc99a4e67e.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
309
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b5c0e1a9256d2f592e3fcac9302eaa26.exe
Verdict:
Malicious activity
Analysis date:
2023-10-12 14:42:35 UTC
Tags:
stealc stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Gathering data
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Oski Stealer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Yara detected Stealc
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-10-12 14:41:06 UTC
File Type:
PE (Exe)
Extracted files:
11
AV detection:
15 of 23 (65.22%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:stealc discovery stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Checks installed software on the system
Downloads MZ/PE file
Stealc
Malware Config
C2 Extraction:
http://elijahdiego.top
Unpacked files
SH256 hash:
aeff3efd0efd653017be31b76b6ed604a51f4bd25e75a3e3a547c55c7383fa10
MD5 hash:
895d21b372e3051127aaeb9d335bfcd6
SHA1 hash:
5b921dde57bc529a58998e028b0943ec607afa3d
Detections:
stealc
Parent samples :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 hash:
119e903551a459831af73657fa4478655a8a94febcfbb5f82be19781cdc4a123
MD5 hash:
b5c0e1a9256d2f592e3fcac9302eaa26
SHA1 hash:
d9af2e07d01c16074428e6715b88f1b7ed3242dd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_Mars_Stealer
Author:@malgamy12
Description:detect_Mars_Stealer
Rule name:infostealer_win_stealc_standalone
Description:Find standalone Stealc sample based on decryption routine or characteristic strings
Reference:https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_stealc_w0
Author:crep1x
Description:Find standalone Stealc sample based on decryption routine or characteristic strings
Reference:https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe 119e903551a459831af73657fa4478655a8a94febcfbb5f82be19781cdc4a123

(this sample)

  
Delivery method
Distributed via web download

Comments