MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4828b8aae87a5f0c994b920050caf0093da3e296959f6350ccb3c61fba2bdebe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 16


Intelligence 16 IOCs YARA 16 File information Comments

SHA256 hash: 4828b8aae87a5f0c994b920050caf0093da3e296959f6350ccb3c61fba2bdebe
SHA3-384 hash: 0ebc64d07b3b62bcad77f7b194623aa2c03781eee3d75d5eaf470a66f3724be9e22f0e94e15cc04ab740906bd0ae1a35
SHA1 hash: 64652d1f8cf9e6a93cf4502466073dbe4057141d
MD5 hash: 438d9171a6282478fcc2cd67daefbc34
humanhash: princess-cat-stairway-grey
File name:4828b8aae87a5f0c.exe
Download: download sample
Signature Stealc
File size:2'323'968 bytes
First seen:2026-03-15 06:23:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 77bb604ddb8d2a9df61815c9b5a4d907 (3 x Stealc, 3 x Tofsee, 1 x TeamBot)
ssdeep 12288:0BRXpWPhK8WZVo84QTUIU9O5NZUkwz2dzdICFjV+68Jvso84QTUIU9O5NZUkwz2e:0Bb/rVlTUl9O5A7LXvslTUl9O5A7LXv
Threatray 2'782 similar samples on MalwareBazaar
TLSH T122B5630ABBFAC965E4BF1B743DA9C38925F3FD668D01C76B7189034E0CB56004D61A7A
TrID 39.7% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
21.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
8.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
8.3% (.EXE) Win64 Executable (generic) (6522/11/2)
6.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter Skynet11
Tags:exe Stealc

Intelligence


File Origin
# of uploads :
1
# of downloads :
134
Origin country :
AU AU
Vendor Threat Intelligence
Malware configuration found for:
AceCryptor Stealc
Details
AceCryptor
an extracted shellcode loader component and a TEA decryption key
AceCryptor
an extracted payload
AceCryptor
an extracted shellcode loader component and the ms_c_rand-XOR seed
Stealc
decrypted strings, an RC4 key, c2 url, url paths, and possibly a missionid and a separate network RC4 key
Malware family:
n/a
ID:
1
File name:
x4828b8aae87a5f0c994b920050caf0093da3e296959f6350ccb3c61fba2bdebe.exe
Verdict:
Malicious activity
Analysis date:
2026-03-15 05:14:53 UTC
Tags:
stealc stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
injection obfusc
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
azorult fingerprint glupteba infostealer krypt microsoft_visual_cc overlay stealc tofsee unsafe
Result
Gathering data
Verdict:
Malicious
File Type:
exe x32
Detections:
HEUR:Trojan-PSW.Win32.Stealerc.gen HEUR:Trojan.Win32.Agent.gen
Gathering data
Threat name:
Win32.Trojan.MarsStealer
Status:
Malicious
First seen:
2026-03-14 22:35:43 UTC
File Type:
PE (Exe)
Extracted files:
13
AV detection:
25 of 36 (69.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:stealc botnet:default discovery stealer
Behaviour
Program crash
System Location Discovery: System Language Discovery
Stealc
Stealc family
Malware Config
C2 Extraction:
http://kevinrobinson.top
Unpacked files
SH256 hash:
4828b8aae87a5f0c994b920050caf0093da3e296959f6350ccb3c61fba2bdebe
MD5 hash:
438d9171a6282478fcc2cd67daefbc34
SHA1 hash:
64652d1f8cf9e6a93cf4502466073dbe4057141d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_Mars_Stealer
Author:@malgamy12
Description:detect_Mars_Stealer
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:infostealer_win_stealc_standalone
Description:Find standalone Stealc sample based on decryption routine or characteristic strings
Reference:https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/
Rule name:malware_Stealc_str
Author:JPCERT/CC Incident Response Group
Description:Stealc infostealer
Rule name:Stealc
Author:kevoreilly
Description:Stealc Payload
Rule name:Suspicious_Process
Author:Security Research Team
Description:Suspicious process creation
Rule name:Windows_Trojan_Generic_2993e5a5
Author:Elastic Security
Rule name:Windows_Trojan_Stealc_5d3f297c
Author:Elastic Security
Rule name:Windows_Trojan_Stealc_b8ab9ab5
Author:Elastic Security
Rule name:win_stealc_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.stealc.
Rule name:win_stealc_bytecodes_oct_2023
Author:Matthew @ Embee_Research
Description:Bytecodes present in Stealc decoding routine
Rule name:win_stealc_w0
Author:crep1x
Description:Find standalone Stealc sample based on decryption routine or characteristic strings
Reference:https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/
Rule name:yarahub_win_stealc_bytecodes_oct_2023
Author:Matthew @ Embee_Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments