MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 15845dec2c7e05004d52ed8c1541d3b364fe6155f9263f7599b4e684fab2c3a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 10


Intelligence 10 IOCs YARA 9 File information Comments

SHA256 hash: 15845dec2c7e05004d52ed8c1541d3b364fe6155f9263f7599b4e684fab2c3a5
SHA3-384 hash: 7e26f09c230f55df6f8af11dccdd20661e2acd513eb21a4fddacb85ce0249e9e0947b8c19946810a9655c089db15508b
SHA1 hash: 592e2f8e1d6d72e66e8b164b5039f966e105f6dd
MD5 hash: 2b2eab865b6f06cba30a1c8d51ba2232
humanhash: lemon-florida-eight-idaho
File name:file
Download: download sample
Signature Stealc
File size:5'220'576 bytes
First seen:2024-01-16 16:32:32 UTC
Last seen:2024-01-16 18:22:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0751433fb799ff99dbf59b2d0c85d83d (4 x StormKitty, 3 x AgentTesla, 2 x Stealc)
ssdeep 49152:X57qFK3V68ujeUKdHLgRJkkHnrkHhmvuFuvsqH77z1skzWQrzBwtmar58cJMfX92:Qfw0b1ByQr4SxP0
Threatray 44 similar samples on MalwareBazaar
TLSH T19936BE06B7E405E4E87BC630CA199B32D6B2F85A0631835B0568D34E1E77AD18F7B376
TrID 60.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
17.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
10.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.1% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 009286868686f800 (4 x Stealc, 4 x AgentTesla, 3 x Smoke Loader)
Reporter jstrosch
Tags:exe signed Stealc X64

Code Signing Certificate

Organisation:Microsoft Code Signing PCA 2011
Issuer:Microsoft Code Signing PCA 2011
Algorithm:sha256WithRSAEncryption
Valid from:2024-01-11T02:12:42Z
Valid to:2025-01-11T02:12:42Z
Serial number: f8b284a3364593b56c7d1fcc9fb0a80d
Thumbprint Algorithm:SHA256
Thumbprint: 9590060b292dc0aa671c82642da626984a61d18e624a2c67beebe0f98b583c72
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
jstrosch
Found at hxxp://15.204.49[.]148/files/Setup.exe by #subcrawl

Intelligence


File Origin
# of uploads :
2
# of downloads :
332
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug control hacktool lolbin overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
HTMLPhisher, Fabookie, Glupteba, GuLoade
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables UAC (registry)
Drops script or batch files to the startup folder
Found malware configuration
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes many files with high entropy
Writes to foreign memory regions
Yara detected BlockedWebSite
Yara detected Fabookie
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected GuLoader
Yara detected Stealc
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1375543 Sample: file.exe Startdate: 16/01/2024 Architecture: WINDOWS Score: 100 134 Found malware configuration 2->134 136 Malicious sample detected (through community Yara rule) 2->136 138 Antivirus detection for URL or domain 2->138 140 15 other signatures 2->140 10 file.exe 1 2->10         started        process3 signatures4 168 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 10->168 170 Writes to foreign memory regions 10->170 172 Allocates memory in foreign processes 10->172 174 4 other signatures 10->174 13 jsc.exe 15 502 10->13         started        18 powershell.exe 23 10->18         started        process5 dnsIp6 128 194.104.136.64 SMEERBOEL-ASSMEERBOELBVNL Netherlands 13->128 130 107.167.110.211 OPERASOFTWAREUS United States 13->130 132 14 other IPs or domains 13->132 104 C:\Users\...\zZa5mvdw5ty5WdbM8YaUMjwx.exe, PE32 13->104 dropped 106 C:\Users\...\y6sh9SE28O0wlEC3EKyL5Oqv.exe, PE32+ 13->106 dropped 108 C:\Users\...\x7RevTHObsVtn62RA6rFA88Z.exe, PE32 13->108 dropped 110 317 other malicious files 13->110 dropped 176 Drops script or batch files to the startup folder 13->176 178 Creates HTML files with .exe extension (expired dropper behavior) 13->178 180 Writes many files with high entropy 13->180 20 AlC0RAbcOIkRZwa3J0Ey3aKA.exe 13->20         started        25 soz5XGuKV0Qgjky931mSPbbV.exe 13->25         started        27 MS13WVgOq2Qy8KAVMFWvtWUW.exe 13->27         started        31 9 other processes 13->31 29 conhost.exe 18->29         started        file7 signatures8 process9 dnsIp10 112 107.167.110.217 OPERASOFTWAREUS United States 20->112 114 107.167.125.189 OPERASOFTWAREUS United States 20->114 120 6 other IPs or domains 20->120 94 9 other malicious files 20->94 dropped 142 Writes many files with high entropy 20->142 33 AlC0RAbcOIkRZwa3J0Ey3aKA.exe 20->33         started        36 AlC0RAbcOIkRZwa3J0Ey3aKA.exe 20->36         started        38 AlC0RAbcOIkRZwa3J0Ey3aKA.exe 20->38         started        116 185.172.128.53 NADYMSS-ASRU Russian Federation 25->116 118 185.172.128.90 NADYMSS-ASRU Russian Federation 25->118 84 C:\Users\user\AppData\Local\...\INetC.dll, PE32 25->84 dropped 86 C:\Users\user\AppData\Local\...\nscEF5C.tmp, PE32 25->86 dropped 96 2 other malicious files 25->96 dropped 40 nscEF5C.tmp 25->40         started        44 BroomSetup.exe 25->44         started        122 2 other IPs or domains 27->122 88 C:\Windows\Microsoft.NET\...\FoxitPhantom.dll, PE32+ 27->88 dropped 90 C:\Users\user\AppData\Local\Temp\...\Zip.dll, PE32 27->90 dropped 92 C:\Users\user\AppData\Local\...\Checker.dll, PE32 27->92 dropped 98 11 other malicious files 27->98 dropped 144 Query firmware table information (likely to detect VMs) 27->144 146 Creates an undocumented autostart registry key 27->146 148 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 27->148 124 5 other IPs or domains 31->124 100 6 other malicious files 31->100 dropped 150 Detected unpacking (changes PE section rights) 31->150 152 Detected unpacking (overwrites its own PE header) 31->152 154 Found Tor onion address 31->154 156 3 other signatures 31->156 46 WerFault.exe 31->46         started        48 WerFault.exe 31->48         started        50 WerFault.exe 31->50         started        52 4 other processes 31->52 file11 signatures12 process13 dnsIp14 66 Opera_installer_2401161653174806524.dll, PE32 33->66 dropped 68 C:\Users\user\...\opera_crashreporter.exe, PE32+ 33->68 dropped 70 C:\Users\user\AppData\...\opera_browser.dll, PE32+ 33->70 dropped 80 13 other malicious files 33->80 dropped 54 AlC0RAbcOIkRZwa3J0Ey3aKA.exe 33->54         started        72 Opera_installer_2401161653152083212.dll, PE32 36->72 dropped 74 Opera_installer_2401161653159474872.dll, PE32 38->74 dropped 126 185.172.128.79 NADYMSS-ASRU Russian Federation 40->126 76 C:\Users\user\AppData\...\softokn3[1].dll, PE32 40->76 dropped 78 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 40->78 dropped 82 10 other files (6 malicious) 40->82 dropped 158 Detected unpacking (changes PE section rights) 40->158 160 Detected unpacking (overwrites its own PE header) 40->160 162 Tries to steal Mail credentials (via file / registry access) 40->162 164 2 other signatures 40->164 57 cmd.exe 44->57         started        file15 signatures16 process17 file18 102 Opera_installer_2401161653179136596.dll, PE32 54->102 dropped 166 Uses schtasks.exe or at.exe to add and modify task schedules 57->166 60 conhost.exe 57->60         started        62 chcp.com 57->62         started        64 schtasks.exe 57->64         started        signatures19 process20
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2024-01-11 16:15:58 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
22 of 38 (57.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:fabookie family:glupteba family:stealc dropper evasion loader spyware stealer trojan upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
NSIS installer
Program crash
Launches sc.exe
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
UPX packed file
Downloads MZ/PE file
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Modifies boot configuration data using bcdedit
Detect Fabookie payload
Fabookie
Glupteba
Glupteba payload
Stealc
UAC bypass
Malware Config
C2 Extraction:
http://185.172.128.79
Unpacked files
SH256 hash:
15845dec2c7e05004d52ed8c1541d3b364fe6155f9263f7599b4e684fab2c3a5
MD5 hash:
2b2eab865b6f06cba30a1c8d51ba2232
SHA1 hash:
592e2f8e1d6d72e66e8b164b5039f966e105f6dd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe 15845dec2c7e05004d52ed8c1541d3b364fe6155f9263f7599b4e684fab2c3a5

(this sample)

  
Delivery method
Distributed via web download

Comments