MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3b79a6f501554bc68d204d6b0b7ea80cc1619d9dd0ffebb6933edc3e9b8f29ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 13
| SHA256 hash: | 3b79a6f501554bc68d204d6b0b7ea80cc1619d9dd0ffebb6933edc3e9b8f29ac |
|---|---|
| SHA3-384 hash: | 365db6219ba4c7284e8d8a63b7b22321fdc052346f43ce742b433c7a08c55d719df1bb9ae890d47c9eaceb0eceeed897 |
| SHA1 hash: | bb381ae78ca1c46db897add5b0da046515985692 |
| MD5 hash: | 21617215ffe926fd76b00a8b2f3a28c7 |
| humanhash: | six-harry-spring-thirteen |
| File name: | file |
| Download: | download sample |
| Signature | Stealc |
| File size: | 210'472 bytes |
| First seen: | 2024-09-10 18:09:39 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 3072:utjx0IjyV4+F/0UlDMHIxXh1RLsT9I911w84MtRqdT9P1lThq9fZpYU7cCYfJkZS:suIujssD4I7911w8pReHg9fZpBQLhxEO |
| TLSH | T1DF2412161BA65633EEAC9E34B4F1D7649E64F7AA9CD3450A1B20D823DBC4F383E14274 |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | exe Stealc |
Intelligence
File Origin
# of uploads :
1
# of downloads :
387
Origin country :
USVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2024-09-10 18:11:20 UTC
Tags:
stealer stealc
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
70%
Tags:
Encryption Static
Verdict:
Malicious
Labled as:
Malware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Stealc
Verdict:
Malicious
Result
Threat name:
Stealc
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Suricata IDS alerts for network traffic
Writes to foreign memory regions
Yara detected Powershell download and execute
Yara detected Stealc
Behaviour
Behavior Graph:
Score:
73%
Verdict:
Malware
File Type:
PE
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
stealc
Score:
10/10
Tags:
family:stealc botnet:cry discovery stealer
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Stealc
Malware Config
C2 Extraction:
http://45.152.113.10
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
b942a672a54a729085b437eb710b62c64183331c6a57fe0ec22039201de6b689
MD5 hash:
118f57a4bbb5a429ff1fc129c0c739dc
SHA1 hash:
653e9577e9878e3b930bfa178c0aa224fb61f8d5
Detections:
stealc
Parent samples :
39799cbca0280a21fa444531c85521db039ef70f963a8960f3fcaca71d3cf802
f7e542218783c81229c438685de0c7c29a619790796833069eddb97b2eb34d29
56ae5bba6fe924b256f6bae52762d29816fe2b92500b7be0baba2ca0ec396db4
3b79a6f501554bc68d204d6b0b7ea80cc1619d9dd0ffebb6933edc3e9b8f29ac
e45ef7fdd1a92c5ed40b3365a895623a112ee16444cf0ebe70619cf09d8628ca
c5d5a4fd2200126f32170a7fd214850c244eed7c7279c5773e41c45049202526
f7e542218783c81229c438685de0c7c29a619790796833069eddb97b2eb34d29
56ae5bba6fe924b256f6bae52762d29816fe2b92500b7be0baba2ca0ec396db4
3b79a6f501554bc68d204d6b0b7ea80cc1619d9dd0ffebb6933edc3e9b8f29ac
e45ef7fdd1a92c5ed40b3365a895623a112ee16444cf0ebe70619cf09d8628ca
c5d5a4fd2200126f32170a7fd214850c244eed7c7279c5773e41c45049202526
SH256 hash:
3b79a6f501554bc68d204d6b0b7ea80cc1619d9dd0ffebb6933edc3e9b8f29ac
MD5 hash:
21617215ffe926fd76b00a8b2f3a28c7
SHA1 hash:
bb381ae78ca1c46db897add5b0da046515985692
Malware family:
Stealc
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.09
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Dropped by
Privateloader
Delivery method
Distributed via web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.