MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2bd90ebb9e56d79b4f68f92a47c8d78c97a0d4290966325c0c49744bc21b491f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 15
| SHA256 hash: | 2bd90ebb9e56d79b4f68f92a47c8d78c97a0d4290966325c0c49744bc21b491f |
|---|---|
| SHA3-384 hash: | fdc2bcda6970634ecf7090492e4ae659c03ee09e0b79afa12777caefc58582662b09e8275037288ca82fa503028b3ec8 |
| SHA1 hash: | e2f2436d519f10dd0adc04522a2d94f4aa5c1890 |
| MD5 hash: | c80e8f94bfe6637b15e06aadf61e18b4 |
| humanhash: | seventeen-cardinal-snake-william |
| File name: | file |
| Download: | download sample |
| Signature | Stealc |
| File size: | 342'016 bytes |
| First seen: | 2023-11-25 01:41:51 UTC |
| Last seen: | 2023-11-25 06:50:05 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ac2a65b4a5041877693100400bbe0f6f (8 x Smoke Loader, 5 x Stealc, 1 x Vidar) |
| ssdeep | 6144:IDg4ME33jX1YULFdsgDNRWNElTQrXWfTGx:IDg4d1nd9ZRLmCT6 |
| TLSH | T16174B74386E13D44EE269B729F2FC6EC7B1DF6508F4A7B6621189E1F44B02BAD163710 |
| TrID | 34.8% (.EXE) Win64 Executable (generic) (10523/12/4) 16.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 14.9% (.EXE) Win32 Executable (generic) (4505/5/1) 6.8% (.ICL) Windows Icons Library (generic) (2059/9) 6.7% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 000818080c060200 (1 x Stealc) |
| Reporter | |
| Tags: | exe Stealc |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.