MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5ece35d565cc0b5274c6ce8cf9a782c9c8e07baa2296267454fbc325d194a1cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 11
| SHA256 hash: | 5ece35d565cc0b5274c6ce8cf9a782c9c8e07baa2296267454fbc325d194a1cd |
|---|---|
| SHA3-384 hash: | 8a8c1d2c61969df9f9c3e560bcccf4b272f590f407e3184e6df8761eb7534a4f127ccf8cc57b75900d27b98d73632dfa |
| SHA1 hash: | 01acdeba8858275bfa3455d201212e894fa8b51a |
| MD5 hash: | adce37ac236361903688788a1b67078c |
| humanhash: | magnesium-uncle-carbon-hydrogen |
| File name: | SecuriteInfo.com.Win64.PWSX-gen.7949.23910 |
| Download: | download sample |
| Signature | Stealc |
| File size: | 817'888 bytes |
| First seen: | 2023-12-24 08:14:21 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b12336fa8cbb9bd1c3e11ad0d8477f71 (2 x Smoke Loader, 2 x Stealc, 1 x RemcosRAT) |
| ssdeep | 24576:JMOChytCU3p5xpqDsY8EBf5FkNiA2M7Apd0fq:JgKhDcsYnbF4ipMs3 |
| Threatray | 6 similar samples on MalwareBazaar |
| TLSH | T16F0523365F6A7707DF089830809EA117F17CF0975E7E842E70AAB193CA5A163352DB36 |
| TrID | 64.7% (.EXE) UPX compressed Win64 Executable (70117/5/12) 25.0% (.EXE) UPX compressed Win32 Executable (27066/9/6) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 1.8% (.EXE) OS/2 Executable (generic) (2029/13) 1.8% (.EXE) Generic Win/DOS Executable (2002/3) |
| File icon (PE): | |
| dhash icon | 009286868686f800 (4 x Stealc, 4 x AgentTesla, 3 x Smoke Loader) |
| Reporter | |
| Tags: | exe signed Stealc |
Code Signing Certificate
| Organisation: | Microsoft Code Signing PCA 2011 |
|---|---|
| Issuer: | Microsoft Code Signing PCA 2011 |
| Algorithm: | sha256WithRSAEncryption |
| Valid from: | 2023-12-24T01:59:52Z |
| Valid to: | 2024-12-24T01:59:52Z |
| Serial number: | df3af5fe6435dfadb55daeaa8a3c7f7b |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | 0fbe931c608495d774e2657a3395004721b4558f28e8542726762ea17a348092 |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
Intelligence
File Origin
# of uploads :
1
# of downloads :
312
Origin country :
FRVendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Launching a process
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Connecting to a non-recommended domain
Sending an HTTP GET request
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Creating a file in the %temp% directory
Creating a file in the %AppData% subdirectories
Searching for synchronization primitives
Running batch commands
Using the Windows Management Instrumentation requests
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Changing a file
Launching cmd.exe command interpreter
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
monero overlay packed packed packed upx
Verdict:
Malicious
Labled as:
Lazy.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
Glupteba
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Adds extensions / path to Windows Defender exclusion list
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus detection for URL or domain
Connects to a pastebin service (likely for C&C)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops script or batch files to the startup folder
Found evasive API chain (may stop execution after checking mutex)
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies Windows Defender protection settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Drops script at startup location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Glupteba
Behaviour
Behavior Graph:
Score:
99%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-24 08:15:07 UTC
File Type:
PE+ (Exe)
Extracted files:
5
AV detection:
10 of 37 (27.03%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
Result
Malware family:
stealc
Score:
10/10
Tags:
family:glupteba family:stealc dropper evasion loader stealer upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Runs ping.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Modifies boot configuration data using bcdedit
Drops startup file
Executes dropped EXE
Loads dropped DLL
UPX packed file
Downloads MZ/PE file
Modifies Windows Firewall
Glupteba
Glupteba payload
Stealc
Malware Config
C2 Extraction:
http://77.91.76.36
Unpacked files
SH256 hash:
1b2d5122be350d771d4bb2b66d41092d7cf94b5f42affa9a56503bcbd978192e
MD5 hash:
46b80e236b46f9b15f178363f7f0d584
SHA1 hash:
d493fc236105efb4aae752f9575480547f9dc7ad
SH256 hash:
5ece35d565cc0b5274c6ce8cf9a782c9c8e07baa2296267454fbc325d194a1cd
MD5 hash:
adce37ac236361903688788a1b67078c
SHA1 hash:
01acdeba8858275bfa3455d201212e894fa8b51a
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.