MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 51e1241c298e1af44d164318bc8e11df464523aa29c9a5477403b1646659e101. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 9
| SHA256 hash: | 51e1241c298e1af44d164318bc8e11df464523aa29c9a5477403b1646659e101 |
|---|---|
| SHA3-384 hash: | 8f0e6839cfbeb7b20b3c38350f827d85dc92f8c0633ba17d0f103dffefc2fa025d95f4e48782d84893ba4db6c305c8bf |
| SHA1 hash: | ec6972ddc67db257c87428a83b704bf056ed81ff |
| MD5 hash: | caa80b44c82963fb77920e24937891e6 |
| humanhash: | september-yankee-mexico-louisiana |
| File name: | pnk333.zip |
| Download: | download sample |
| Signature | Stealc |
| File size: | 11'968'905 bytes |
| First seen: | 2024-09-25 14:13:59 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 196608:WsumuYLk9ujJuioDm8wsCEfsYEklGYTebgZU9uYXHcjysP9yHfL0rOn/DYUoAS0m:duRYLk9ul0twsCinFkYTebsU9uYMx0rG |
| TLSH | T18EC62275EE13C4D6D4D42AB9CDE30E883373C8DE9351468282A9213CADD778A0E9E5D7 |
| Magika | zip |
| Reporter | |
| Tags: | file-pumped LummaStealer Stealc zip |
Intelligence
File Origin
# of uploads :
1
# of downloads :
186
Origin country :
NLFile Archive Information
This file archive contains 1 file(s), sorted by their relevance:
| File name: | 3uTools.exe |
|---|---|
| Pumped file | This file is pumped. MalwareBazaar has de-pumped it. |
| File size: | 792'803'329 bytes |
| SHA256 hash: | 878ba7636fc9be08358b342a29f0c7f04d5e3d8eac1f6d6fb1144e2e2ef190c9 |
| MD5 hash: | 321a9ce996c2bdd88620dc842a4dd344 |
| De-pumped file size: | 37'828'608 bytes (Vs. original size of 792'803'329 bytes) |
| De-pumped SHA256 hash: | 06b83c886bc9d923d0b2239887d4d9da0e3a4add52e4fae56907f2dc90c7b664 |
| De-pumped MD5 hash: | 5cd397dc74570cf64977a172245745a9 |
| MIME type: | application/x-dosexec |
| Signature | Stealc |
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malicious
File Type:
ZIP File - Malicious
Behaviour
SuspiciousEmbeddedObjects detected
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
anti-debug golang large-file overlay
Result
Verdict:
MALICIOUS
Link:
Score:
98%
Verdict:
Malware
File Type:
ARCHIVE
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2024-09-25 14:15:14 UTC
File Type:
Binary (Archive)
Extracted files:
40
AV detection:
6 of 24 (25.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
stealc
Score:
10/10
Tags:
family:lumma family:stealc botnet:c1 discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Drops startup file
Executes dropped EXE
Downloads MZ/PE file
Lumma Stealer, LummaC
Stealc
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://45.200.149.53
https://racedsuitreow.shop/api
https://racedsuitreow.shop/api
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Stealc
zip 51e1241c298e1af44d164318bc8e11df464523aa29c9a5477403b1646659e101
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.