MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 14ebace0658729a5e2cf930e7eaaa3e4ae22c91da411410951d78a38bd6beef6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 18


Intelligence 18 IOCs YARA 73 File information Comments

SHA256 hash: 14ebace0658729a5e2cf930e7eaaa3e4ae22c91da411410951d78a38bd6beef6
SHA3-384 hash: d7b34d5d14a64059d1697ab1f644e02b70d6bae1ea72542413c134243d64a1f2f1ac40886b68a025c51f424bcebda877
SHA1 hash: bf446b2d3bf640b219e703496e99c9d9f70a4b0f
MD5 hash: e0c485160c3f2bdcc8024c3843436e9f
humanhash: texas-cat-orange-wyoming
File name:14ebace0658729a5e2cf930e7eaaa3e4ae22c91da411410951d78a38bd6beef6
Download: download sample
Signature Stealc
File size:22'219'264 bytes
First seen:2026-01-29 15:46:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4029dc5ee830151a426fff64189bae0e (2 x RedLineStealer, 2 x Stealc, 1 x SVCStealer)
ssdeep 393216:6ynUGawJiOY7wW8cuCq6mdUSCRLwq/y14RwOcuvo:fMwhW8JCq9qJFV/E4RwOc
Threatray 2'510 similar samples on MalwareBazaar
TLSH T1A7271216B29640BDE06A87398562D536D6F77D111721AACB47E0BC9BBF331E01E3E312
TrID 49.3% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
19.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.4% (.EXE) Win64 Executable (generic) (10522/11/4)
5.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter JAMESWT_WT
Tags:45-93-20-55 exe Stealc

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
tinynuke
ID:
1
File name:
14ebace0658729a5e2cf930e7eaaa3e4ae22c91da411410951d78a38bd6beef6
Verdict:
Malicious activity
Analysis date:
2026-01-29 15:49:23 UTC
Tags:
stealer stealc telegram tinynuke auto-reg auto-sch auto redline svitstealer python metastealer rat asyncrat remote arch-doc pyinstaller

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Creating a process from a recently created file
Сreating synchronization primitives
Creating a file in the %temp% subdirectories
Creating a window
Creating a file
Enabling the 'hidden' option for recently created files
Creating a file in the %AppData% subdirectories
Searching for synchronization primitives
Connecting to a non-recommended domain
Connection attempt
Sending an HTTP POST request
DNS request
Sending a custom TCP request
Launching a process
Creating a process with a hidden window
Sending an HTTP GET request to an infection source
Using the Windows Management Instrumentation requests
Sending an HTTP GET request
Reading critical registry keys
Moving a recently created file
Behavior that indicates a threat
Modifying a system executable file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Connection attempt to an infection source
Changing settings of the browser security zones
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm crypt fingerprint meterpreter microsoft_visual_cc packed soft-404 xpack
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-01-28T20:53:00Z UTC
Last seen:
2026-01-31T06:42:00Z UTC
Hits:
~100
Detections:
VHO:Trojan.Win32.Agentb.gen Trojan-Spy.Stealer.TCP.ServerRequest Trojan.Win32.Shellcode.sb HEUR:Trojan.Win32.Agent.gen Trojan.Win32.Agent.xccfjq Trojan.Win32.Agent.sb Backdoor.Win32.DarkVNC.sb Trojan-Spy.Agent.HTTP.C&C Trojan-Spy.Stealer.HTTP.C&C PDM:Trojan.Win32.Tasker.cust HEUR:Trojan-Banker.Win32.TinyNuke.gen HEUR:HackTool.Win64.Inject.gen Backdoor.MSIL.Crysan.fb Backdoor.MSIL.Crysan.c Backdoor.Win32.Zegost.sb HEUR:Backdoor.MSIL.SheetRat.gen Trojan-PSW.MSIL.Stealer.sb Trojan-Banker.TinyNuke.HTTP.C&C Trojan.Win32.Vimditator.sb HEUR:Trojan.Win32.Generic Backdoor.MSIL.Crysan.sb Backdoor.MSIL.Crysan.d Backdoor.Win32.Androm VHO:Trojan-PSW.Win32.Convagent.gen VHO:Backdoor.Win32.Agent.gen Trojan-PSW.Win32.Vidar.gto Trojan-Banker.Win32.TinyNuke.sb Trojan-PSW.Win32.Pycoon.sb Trojan-Downloader.Win32.Bazloader.kh VHO:Trojan-PSW.Win32.Lumma.gen Trojan-PSW.Win32.Lumma.aanj Trojan-PSW.MSIL.Reline.aarh HEUR:Trojan.Python.Rodico.gen HEUR:Backdoor.Win32.Agent.gen Trojan-Spy.Stealer.TCP.C&C Trojan-PSW.MSIL.Reline.sb BSS:Trojan.Win32.Generic Trojan-Dropper.Win32.Dapato.sb Trojan-Spy.Win32.SpyEyes Trojan-Banker.Win32.ClipBanker.sb VHO:Backdoor.MSIL.Crysan.gen Trojan-PSW.Win64.StealC.sb Trojan.Win32.Gatak.sb Trojan.MSIL.Crypt.sb PDM:Trojan.Win32.Generic Backdoor.MSIL.Crysan.mmv Trojan.Win32.AntiAV.sb Trojan-PSW.Vidar.HTTP.C&C Trojan.Win32.Zonidel.sb Trojan-PSW.Lumma.HTTP.C&C Trojan-PSW.Win32.Stealer.sb Trojan-Dropper.Win32.Injector.sb Backdoor.MSIL.Crysan.b VHO:Trojan-PSW.Win32.Lumma.aanj HEUR:Exploit.Win32.UAC.gen PDM:Exploit.Win32.Generic Backdoor.MSIL.Agent.sb VHO:Trojan-PSW.Win32.Vidar.gen Trojan.Win32.Inject.sb Trojan-Downloader.Bazloader.HTTP.C&C Trojan.Win32.Gatak.gos Trojan.Win32.Mansabo.sb Trojan-PSW.Win32.StealC.v2 Trojan.Win64.Agent.sb Trojan-Banker.Win32.ClipBanker.ahjh VHO:Backdoor.Win32.Zegost.gen Trojan.Gatak.TCP.C&C Trojan-Downloader.Win32.Inject.sb Trojan.Win32.RokRat.sb
Gathering data
Gathering data
Threat name:
Win64.Trojan.SvcStealer
Status:
Malicious
First seen:
2026-01-29 01:02:28 UTC
File Type:
PE+ (Exe)
Extracted files:
17
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
svcstealer
Score:
  10/10
Tags:
family:asyncrat family:redline family:stealc family:svcstealer botnet:default botnet:dropped botnet:loaded botnet:mrgbooxgp55qkw== discovery downloader execution infostealer installer persistence pyinstaller rat spyware stealer upx
Behaviour
Checks processor information in registry
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Browser Information Discovery
Detects Pyinstaller
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Command and Scripting Interpreter: PowerShell
Suspicious use of SetThreadContext
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
ACProtect 1.3x - 1.4x DLL software
Checks computer location settings
Executes dropped EXE
Reads user/profile data of web browsers
Downloads MZ/PE file
Async RAT payload
AsyncRat
Asyncrat family
Detects SvcStealer Payload
RedLine
RedLine payload
Redline family
Stealc
Stealc family
SvcStealer, Diamotrix
Svcstealer family
Malware Config
C2 Extraction:
http://45.93.20.55
http://45.93.20.55/xuiobvu/data.php
http://62.60.226.159/zbuyowgn/data.php
http://196.251.107.23/diamo/data.php
http://178.16.53.7/diamo/data.php
http://158.94.208.102/diamo/data.php
http://196.251.107.61/diamo/data.php
196.251.107.104:6606
196.251.107.104:7707
196.251.107.104:8808
45.93.20.151:6606
45.93.20.151:7707
45.93.20.151:8808
196.251.107.104:1912
Malware family:
Stealc.v2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AsyncRat
Author:kevoreilly, JPCERT/CC Incident Response Group
Description:AsyncRat Payload
Rule name:asyncrat_kingrat
Author:jeFF0Falltrades
Rule name:Borland
Author:malware-lu
Rule name:Check_Dlls
Rule name:cobalt_strike_beacon_detected
Author:0x0d4y
Description:This rule detects cobalt strike beacons.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:detect_Redline_Stealer_V2
Author:Varp0s
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:GenericRedLineLike
Author:Still
Description:Matches RedLine-like stealer; may match its variants.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:HeavensGate
Author:kevoreilly
Description:Heaven's Gate: Switch from 32-bit to 64-mode
Rule name:Heuristics_ChromeABE
Author:Still
Description:attempts to match instructions related to Chrome App-bound Encryption elevation service; possibly spotted amongst infostealers
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
Rule name:INDICATOR_SUSPICIOUS_References_SecTools
Author:ditekSHen
Description:Detects executables referencing many IR and analysis tools
Rule name:INDICATOR_SUSPICIOUS_ReflectiveLoader
Author:ditekSHen
Description:Detects Reflective DLL injection artifacts
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:malware_asyncrat
Description:detect AsyncRat in memory
Reference:https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_MetaStealer
Author:ditekSHen
Description:Detects MetaStealer infostealer
Rule name:MAL_AsnycRAT
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:MAL_AsyncRAT_Config_Decryption
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:MAL_packer_lb_was_detected
Author:0x0d4y
Description:Detect the packer used by Lockbit4.0
Rule name:Mal_WIN_AsyncRat_RAT_PE
Author:Phatcharadol Thangplub
Description:Use to detect AsyncRAT implant.
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:msil_suspicious_use_of_strreverse
Author:dr4k0nia
Description:Detects mixed use of Microsoft.CSharp and VisualBasic to use StrReverse
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:RedLine_Stealer_unpacked_PulseIntel
Author:PulseIntel
Description:Detecting unpacked Redline
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:StealcV2
Author:Still
Description:attempts to match the instructions found in StealcV2
Rule name:StealcV2
Author:kevoreilly
Description:Stealc V2 Payload
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:Windows_Generic_Threat_c9003b7b
Author:Elastic Security
Rule name:Windows_Generic_Threat_ce98c4bc
Author:Elastic Security
Rule name:Windows_Generic_Threat_efdb9e81
Author:Elastic Security
Rule name:Windows_Trojan_Asyncrat_11a11ba1
Author:Elastic Security
Rule name:Windows_Trojan_Generic_40899c85
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_6dfafd7b
Author:Elastic Security
Rule name:Windows_Trojan_Stealc_41db1d4d
Author:Elastic Security
Rule name:win_asyncrat_bytecodes
Author:Matthew @ Embee_Research
Description:Detects bytecodes present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc)
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_unobfuscated
Author:Matthew @ Embee_Research
Description:Detects strings present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc)
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:win_redline_stealer_generic
Author:dubfib
Rule name:XTinyLoader
Author:Nikos 'n0t' Totosis
Description:Detects XTiny Loader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments