MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f23c30be4d4ca2e8aa3b3b68084b650eee2cd73c6295504090d1976dd7a8bc2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 19


Intelligence 19 IOCs 1 YARA 29 File information Comments

SHA256 hash: 2f23c30be4d4ca2e8aa3b3b68084b650eee2cd73c6295504090d1976dd7a8bc2
SHA3-384 hash: 862d54692e6da66521645149a6b4425fd63f82e835eb2dc8aebc8ae20d8d4d5e5ecfbc8292f3532bba7c2e18543915bf
SHA1 hash: 509dcde8ec0723384608dff3303b660710cd70de
MD5 hash: 4705192917919c532cb019a5f3242c8a
humanhash: bacon-solar-aspen-maryland
File name:EmailMasterv2.0.exe
Download: download sample
Signature Stealc
File size:14'111'744 bytes
First seen:2026-02-01 14:50:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4029dc5ee830151a426fff64189bae0e (2 x RedLineStealer, 2 x Stealc, 1 x SVCStealer)
ssdeep 393216:GynUGawJoomo1wPsZg2KezxK4sHsMRqubYtw4v:bMwpmo1FLXqrRtb
TLSH T1F0E61216B3D640BDE46B873A8962D135D7F3BC115721AA8B47E08D5BBF271A01E3E702
TrID 33.8% (.EXE) InstallShield setup (43053/19/16)
32.6% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
12.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
8.2% (.EXE) Win64 Executable (generic) (10522/11/4)
3.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter abuse_ch
Tags:exe Stealc


Avatar
abuse_ch
Stealc C2:
http://196.251.107.130/cfedbcab777558b8.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://196.251.107.130/cfedbcab777558b8.php https://threatfox.abuse.ch/ioc/1739720/

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
NL NL
Vendor Threat Intelligence
Gathering data
Malware family:
redline
ID:
1
File name:
EmailMasterv2.0.exe
Verdict:
Malicious activity
Analysis date:
2026-02-01 14:33:40 UTC
Tags:
telegram stealer stealc auto-sch auto redline svitstealer clipper diamotrix auto-reg loader python upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
autorun dropper sage remo
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm fingerprint microsoft_visual_cc obfuscated packed soft-404
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-01-30T20:58:00Z UTC
Last seen:
2026-02-01T14:40:00Z UTC
Hits:
~100
Detections:
HEUR:HackTool.Win64.Inject.gen Trojan-Spy.Stealer.TCP.ServerRequest Trojan.Win32.RokRat.sb Trojan.Win32.AntiAV.sb Trojan.Win32.Inject.sb Trojan.Win32.Agent.xccfjq HEUR:Trojan-Banker.Python.ClipBanker.gen HEUR:Trojan.Win32.Agent.gen BSS:Trojan.Win32.Generic Backdoor.Win32.Androm Trojan-PSW.MSIL.Reline.sb Trojan.Snojan.HTTP.C&C Trojan-PSW.Win64.StealC.sb Trojan-Dropper.Win32.Injector.sb Trojan.Win32.Agent.sb Trojan-PSW.Win32.Stealer.sb Trojan.MSIL.Crypt.sb PDM:Trojan.Win32.Tasker.cust Trojan.Win32.Shellcode.sb PDM:Trojan.Win32.Generic Trojan.Win64.Agent.sb Trojan-PSW.MSIL.Stealer.sb Trojan-PSW.Lumma.HTTP.C&C Trojan.Win32.Mansabo.sb Trojan.Win32.Gatak.sb Trojan-PSW.Win32.Coins.sb Trojan-PSW.MSIL.Reline.aarh Trojan-Downloader.Win32.Bazloader.kn VHO:Backdoor.Win32.Agent.gen Trojan-Spy.Stealer.TCP.C&C Trojan-Spy.Stealer.HTTP.C&C Trojan-Ransom.Win32.Blocker.zqgg Trojan-PSW.Win32.StealC.v2 Trojan-Banker.Win32.ClipBanker.sb Trojan-Downloader.Win32.Agent.sb PDM:Exploit.Win32.Generic Trojan-Downloader.Bazloader.HTTP.C&C
Malware family:
SalatStealer
Verdict:
Malicious
Result
Threat name:
Clipboard Hijacker, Diamotrix Clipper, R
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Leaks process information
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Unusual module load detection (module proxying)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Clipboard Hijacker
Yara detected Diamotrix Clipper
Yara detected RedLine Stealer
Yara detected Stealc v2
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1861219 Sample: EmailMasterv2.0.exe Startdate: 01/02/2026 Architecture: WINDOWS Score: 100 132 derzkifrost-990.sbs 2->132 134 t.me 2->134 162 Suricata IDS alerts for network traffic 2->162 164 Found malware configuration 2->164 166 Malicious sample detected (through community Yara rule) 2->166 168 13 other signatures 2->168 11 EmailMasterv2.0.exe 9 2->11         started        15 59B3F83C65ED2858.exe 2->15         started        17 59B3F83C65ED2858.exe 2->17         started        19 59B3F83C65ED2858.exe 2->19         started        signatures3 process4 file5 110 C:\Users\user\Desktopmail Master.exe, PE32+ 11->110 dropped 112 C:\Users\user\AppData\Roaming\xvpbhsn.exe, PE32+ 11->112 dropped 114 C:\Users\user\AppData\Roaming\socxtnre.exe, PE32 11->114 dropped 116 5 other malicious files 11->116 dropped 214 Early bird code injection technique detected 11->214 21 ciopbu.exe 11->21         started        25 xvpbhsn.exe 2 1 11->25         started        27 ponbyxs.exe 2 11->27         started        29 5 other processes 11->29 216 Multi AV Scanner detection for dropped file 15->216 signatures6 process7 dnsIp8 90 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 21->90 dropped 92 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 21->92 dropped 94 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 21->94 dropped 104 52 other malicious files 21->104 dropped 188 Multi AV Scanner detection for dropped file 21->188 32 ciopbu.exe 21->32         started        96 C:\ProgramData\ebecabcdbbbdc.exe, PE32+ 25->96 dropped 190 Found evasive API chain (may stop execution after checking mutex) 25->190 192 Creates autostart registry keys with suspicious names 25->192 194 Creates multiple autostart registry keys 25->194 202 4 other signatures 25->202 34 explorer.exe 60 11 25->34 injected 98 C:\Users\user\AppData\Local\...\ponbyxs.tmp, PE32 27->98 dropped 39 ponbyxs.tmp 27->39         started        142 45.93.20.55, 80 COGENT-174US Netherlands 29->142 144 derzkifrost-990.sbs 104.21.24.120, 49721, 80 CLOUDFLARENETUS United States 29->144 146 t.me 149.154.167.99, 443, 49717 TELEGRAMRU United Kingdom 29->146 100 C:\Users\user\...\59B3F83C65ED2858.exe, PE32 29->100 dropped 102 C:\ProgramData\sxohd.exe, PE32+ 29->102 dropped 196 Contains functionality to inject code into remote processes 29->196 198 Uses schtasks.exe or at.exe to add and modify task schedules 29->198 200 Writes to foreign memory regions 29->200 204 2 other signatures 29->204 41 svchost.exe 29->41         started        43 schtasks.exe 1 29->43         started        45 sxohd.exe 29->45         started        47 2 other processes 29->47 file9 signatures10 process11 dnsIp12 136 62.60.226.159, 49732, 49743, 49756 ASLINE-AS-APASLINELIMITEDHK Iran (ISLAMIC Republic Of) 34->136 86 C:\Users\user\AppData\Local\...\33B8.tmp.exe, PE32+ 34->86 dropped 178 System process connects to network (likely due to code injection or exploit) 34->178 180 Benign windows process drops PE files 34->180 182 Found evasive API chain (may stop execution after checking mutex) 34->182 49 33B8.tmp.exe 34->49         started        53 sxohd.exe 34->53         started        56 ebecabcdbbbdc.exe 34->56         started        64 2 other processes 34->64 88 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 39->88 dropped 58 ponbyxs.exe 39->58         started        138 45.93.20.151, 80 COGENT-174US Netherlands 41->138 184 Unusual module load detection (module proxying) 41->184 60 conhost.exe 43->60         started        186 Multi AV Scanner detection for dropped file 45->186 62 conhost.exe 47->62         started        file13 signatures14 process15 dnsIp16 126 196.251.107.23, 49746, 49772, 80 ANGANI-ASKE Seychelles 49->126 148 Multi AV Scanner detection for dropped file 49->148 150 Early bird code injection technique detected 49->150 152 Found many strings related to Crypto-Wallets (likely being stolen) 49->152 160 5 other signatures 49->160 66 chrome.exe 49->66         started        68 chrome.exe 49->68         started        70 chrome.exe 49->70         started        72 msedge.exe 49->72         started        128 196.251.107.130, 49775, 49777, 80 ANGANI-ASKE Seychelles 53->128 130 196.251.107.61, 49771, 80 ANGANI-ASKE Seychelles 53->130 106 C:\Users\user\AppData\Local\...\CPMXEHTX.exe, PE32+ 53->106 dropped 154 Found direct / indirect Syscall (likely to bypass EDR) 53->154 74 CPMXEHTX.exe 53->74         started        108 C:\Users\user\AppData\Local\...\ponbyxs.tmp, PE32 58->108 dropped 77 ponbyxs.tmp 58->77         started        156 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 60->156 158 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 60->158 file17 signatures18 process19 file20 206 Multi AV Scanner detection for dropped file 74->206 208 Early bird code injection technique detected 74->208 210 Writes to foreign memory regions 74->210 212 2 other signatures 74->212 80 chrome.exe 74->80         started        118 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 77->118 dropped 120 C:\ProgramData\...\vcruntime140.dll (copy), PE32 77->120 dropped 122 C:\ProgramData\...\sciter-x.dll (copy), PE32 77->122 dropped 124 8 other malicious files 77->124 dropped 82 eServiceHost.exe 77->82         started        signatures21 process22 dnsIp23 140 196.251.107.104, 1912, 49755 ANGANI-ASKE Seychelles 82->140 170 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 82->170 172 Found many strings related to Crypto-Wallets (likely being stolen) 82->172 174 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 82->174 176 5 other signatures 82->176 signatures24
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.SvcStealer
Status:
Malicious
First seen:
2026-01-31 01:53:59 UTC
File Type:
PE+ (Exe)
Extracted files:
27
AV detection:
23 of 36 (63.89%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
svcstealer
Score:
  10/10
Tags:
family:redline family:stealc family:svcstealer botnet:loaded botnet:mrgbooxgp55qkw== discovery downloader execution infostealer installer persistence pyinstaller spyware stealer upx
Behaviour
Checks processor information in registry
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Detects Pyinstaller
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
RedLine
RedLine payload
Redline family
SvcStealer, Diamotrix
Svcstealer family
Malware Config
C2 Extraction:
http://45.93.20.55/xuiobvu/data.php
http://62.60.226.159/zbuyowgn/data.php
http://196.251.107.23/diamo/data.php
http://178.16.53.7/diamo/data.php
http://158.94.208.102/diamo/data.php
http://196.251.107.61/diamo/data.php
196.251.107.104:1912
Unpacked files
SH256 hash:
2f23c30be4d4ca2e8aa3b3b68084b650eee2cd73c6295504090d1976dd7a8bc2
MD5 hash:
4705192917919c532cb019a5f3242c8a
SHA1 hash:
509dcde8ec0723384608dff3303b660710cd70de
SH256 hash:
0ddda09f58c380d402d05f639fcc6670ae531c5c8e4268eaf105c5253a524773
MD5 hash:
551849e2518cd95871e463728f50998c
SHA1 hash:
3bff89dc6f7821933dcd0033676ed4bee137b59b
SH256 hash:
4b1e07084c5b745da32d58eb799dcfa1cbaeb2afa59355a17c87eb6dcb3c1471
MD5 hash:
305aa9e6f43c6a477d1c4f6a34ee977a
SHA1 hash:
4fcfa7eebfc4a458d0ff821b605638ec83282a80
SH256 hash:
f54a81f9b49ff8e1261d4ef4cf3c79cdabc0c632de7b9183ced4e0dff2c95c42
MD5 hash:
12dee33a934dac5357e14a6e9150cb43
SHA1 hash:
29ca02386d5bb27be5e0f626c9aac7e037ccb48c
SH256 hash:
148973102ad1c57462feaf7914f4e57a3d3d5854ac1dba55dd4074681a318d77
MD5 hash:
9541ccc03b0966bb3b78a15eb4fd3185
SHA1 hash:
db2bf5a8aaee9a68f03abcc8bc51da1a7200caf6
Malware family:
Stealc.v2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:cobalt_strike_beacon_detected
Author:0x0d4y
Description:This rule detects cobalt strike beacons.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Heuristics_ChromeABE
Author:Still
Description:attempts to match instructions related to Chrome App-bound Encryption elevation service; possibly spotted amongst infostealers
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MAL_packer_lb_was_detected
Author:0x0d4y
Description:Detect the packer used by Lockbit4.0
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:StealcV2
Author:Still
Description:attempts to match the instructions found in StealcV2
Rule name:StealcV2
Author:kevoreilly
Description:Stealc V2 Payload
Rule name:telebot_framework
Author:vietdx.mb
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:Windows_Trojan_Stealc_41db1d4d
Author:Elastic Security
Rule name:XTinyLoader
Author:Nikos 'n0t' Totosis
Description:Detects XTiny Loader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments