MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b1b9e1ed0efa52e4663f9247477c273166481fdd8e639cae35c4909de3566d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 17


Intelligence 17 IOCs YARA 1 File information Comments

SHA256 hash: 4b1b9e1ed0efa52e4663f9247477c273166481fdd8e639cae35c4909de3566d9
SHA3-384 hash: 89e53266bcf32ab2534d28fe69ebb19c62f8b4e9de4cc16919cd5bd2d8f62197462655656b2b1a2f428faddd93955e30
SHA1 hash: ada27ed2eed21562667ce9c4c8ca3712d2c194c7
MD5 hash: 50fc6559127c76fc8112f9dab70f1b8f
humanhash: indigo-florida-seventeen-papa
File name:file
Download: download sample
Signature Stealc
File size:254'464 bytes
First seen:2025-12-25 19:37:42 UTC
Last seen:2025-12-25 21:58:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ed4f5f04d62b18d96b26d6db7c18840 (270 x SalatStealer, 78 x BitRAT, 42 x RedLineStealer)
ssdeep 6144:btukz/YgxzvmnZhonKIVQW8AulLqoS1QHNu6A+UX8zOrL:5uLgteZhUKIVQW8ARoS1QxHC
TLSH T1F74423B27935EB09FA0696F9951858601E7E9645F5EC0786F8CD09D2342BEFB09FC803
TrID 52.7% (.EXE) UPX compressed Win32 Executable (27066/9/6)
12.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.EXE) Win32 Executable (generic) (4504/4/1)
4.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe fbf543 Stealc UPX


Avatar
Bitsight
url: http://130.12.180.43/files/come/random.exe
File size (compressed) :254'464 bytes
File size (de-compressed) :610'304 bytes
Format:win32/pe
Unpacked file: 7f31d970c25ffcbcd85fd512e9456a64ea9ced2312a37f628f1443f133beacf6

Intelligence


File Origin
# of uploads :
3
# of downloads :
89
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
PEPacker Stealc
Details
PEPacker
a UPX version number and an unpacked binary
Stealc
decrypted strings, an RC4 key, c2 url, and url paths
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2025-12-25 19:42:20 UTC
Tags:
stealer stealc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
cobalt packed
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug fingerprint microsoft_visual_cc packed packed packed upx
Verdict:
Malicious
Labled as:
Shellcode.Loader.Marte.X.Generic
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.ShellCodeRunner
Status:
Malicious
First seen:
2025-12-25 20:19:45 UTC
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:stealc botnet:eagle11 discovery stealer upx
Behaviour
System Location Discovery: System Language Discovery
UPX packed file
Stealc
Stealc family
Malware Config
C2 Extraction:
http://23.94.252.171
Verdict:
Malicious
Tags:
trojan Win.Malware.Marte-10045369-0
YARA:
SUSP_Imphash_Mar23_3
Unpacked files
SH256 hash:
4b1b9e1ed0efa52e4663f9247477c273166481fdd8e639cae35c4909de3566d9
MD5 hash:
50fc6559127c76fc8112f9dab70f1b8f
SHA1 hash:
ada27ed2eed21562667ce9c4c8ca3712d2c194c7
SH256 hash:
a66055a1590c0531819a987b2b6e648e04e9611be34b172eeecfcc2b0f3a8b83
MD5 hash:
7d35d6a446d95fe0b0bccbfa03d73a1e
SHA1 hash:
bdc371c1cb59d1aeee486744985391b86deab09d
SH256 hash:
7f31d970c25ffcbcd85fd512e9456a64ea9ced2312a37f628f1443f133beacf6
MD5 hash:
2570aa2d6bec5c5c98e55b776dd39fa0
SHA1 hash:
9e67cdcede17c12c1b18da6d4e8994ff7c41a3d9
Detections:
stealc
Malware family:
Stealc.v2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe 4b1b9e1ed0efa52e4663f9247477c273166481fdd8e639cae35c4909de3566d9

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments