MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d86d5764d4e04e931c0cb222a1c79bc2a6213de1d01bd58a89d6cc9a6f55ce0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 16


Intelligence 16 IOCs YARA 17 File information Comments

SHA256 hash: 2d86d5764d4e04e931c0cb222a1c79bc2a6213de1d01bd58a89d6cc9a6f55ce0
SHA3-384 hash: 385df11497d460544b25bcf6179cbe9c171e93b5da2c3f8d39dfbafc9674ed654013001dd10f4f8daddfe12219e3f925
SHA1 hash: fb49c22f9a9fa2176ffafcd424fc1a9d47887ff6
MD5 hash: 7b6771b140f8241ea207be008e5638e6
humanhash: undress-venus-london-magazine
File name:file
Download: download sample
Signature Stealc
File size:253'952 bytes
First seen:2026-01-28 12:28:46 UTC
Last seen:2026-01-28 18:56:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ed4f5f04d62b18d96b26d6db7c18840 (332 x SalatStealer, 78 x BitRAT, 42 x RedLineStealer)
ssdeep 6144:74vDjIylF3HxOVZYuq/PRom4yLutWKpNFtRlwMd/spTHxK:74vQylBHxKaX/PRN4vWK3FPld/qHx
TLSH T1E044239EE91CC87EC893ECFD23E5941571DAB09033E8F6CD445F82E010EBA676E54829
TrID 52.7% (.EXE) UPX compressed Win32 Executable (27066/9/6)
12.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.EXE) Win32 Executable (generic) (4504/4/1)
4.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe fbf543 Stealc UPX


Avatar
Bitsight
url: http://130.12.180.43/files/drum/monk.exe
File size (compressed) :253'952 bytes
File size (de-compressed) :607'744 bytes
Format:win32/pe
Unpacked file: 8d1a0d68b7544de045948605b1afca727e2fb0281564c0ed8c10c0989b71f632

Intelligence


File Origin
# of uploads :
34
# of downloads :
141
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
PEPacker Stealc
Details
PEPacker
a UPX version number and an unpacked binary
Stealc
decrypted strings, an RC4 key, c2 url, url paths, and possibly a missionid and a separate network RC4 key
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2026-01-28 12:29:25 UTC
Tags:
stealer stealc upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
packed crypt hype
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Connecting to a non-recommended domain
Connection attempt
Sending an HTTP POST request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug fingerprint microsoft_visual_cc packed packed packed swrort upx
Verdict:
Malicious
Labled as:
Shellcode.Loader.Marte.X.Generic
Result
Gathering data
Verdict:
Malicious
File Type:
exe x32
Detections:
Trojan-PSW.Win64.StealC.sb Trojan-PSW.Win32.StealC.v2
Gathering data
Gathering data
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:stealc botnet:mastest discovery spyware stealer upx
Behaviour
Suspicious use of WriteProcessMemory
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
Stealc
Stealc family
Malware Config
C2 Extraction:
http://94.26.90.74
Unpacked files
SH256 hash:
2d86d5764d4e04e931c0cb222a1c79bc2a6213de1d01bd58a89d6cc9a6f55ce0
MD5 hash:
7b6771b140f8241ea207be008e5638e6
SHA1 hash:
fb49c22f9a9fa2176ffafcd424fc1a9d47887ff6
SH256 hash:
8d1a0d68b7544de045948605b1afca727e2fb0281564c0ed8c10c0989b71f632
MD5 hash:
d26bf8ace0dbd944e14016f6a1e03c50
SHA1 hash:
b6484623cc91ff7c075bd9e86e9ac81a31489c6e
Detections:
win_stealc_auto stealc
Malware family:
Stealc.v2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:HeavensGate
Author:kevoreilly
Description:Heaven's Gate: Switch from 32-bit to 64-mode
Rule name:Heuristics_ChromeABE
Author:Still
Description:attempts to match instructions related to Chrome App-bound Encryption elevation service; possibly spotted amongst infostealers
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:StealcV2
Author:kevoreilly
Description:Stealc V2 Payload
Rule name:suspicious_PEs
Author:txc
Description:This rule detected suspicious PE files, based on high entropy and low amount of imported DLLs. This behaviour indicates packed files or files, that hide their true intention.
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:Windows_Trojan_Stealc_41db1d4d
Author:Elastic Security
Rule name:win_stealc_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.stealc.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe 2d86d5764d4e04e931c0cb222a1c79bc2a6213de1d01bd58a89d6cc9a6f55ce0

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments