MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5ee78ca100f37486e25795012e502d905d864fe4dedf0e98a3a72828cb58ea1a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 17
| SHA256 hash: | 5ee78ca100f37486e25795012e502d905d864fe4dedf0e98a3a72828cb58ea1a |
|---|---|
| SHA3-384 hash: | a77744f6eaf2ccd6752d6eafc9bc1f9a85ec829776967bd8fb4093c4292511e30a78232056441953a71d1ac8177eefb5 |
| SHA1 hash: | 8e7c796303dfac50cb02d215873ebb376a8b16ab |
| MD5 hash: | 60cfb99fce2f8aacf2ec2545a94a39c5 |
| humanhash: | muppet-twelve-uniform-island |
| File name: | 5ee78ca100f37486e25795012e502d905d864fe4dedf0.exe |
| Download: | download sample |
| Signature | Stealc |
| File size: | 352'768 bytes |
| First seen: | 2024-10-25 21:40:55 UTC |
| Last seen: | 2024-10-25 22:22:47 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 06c1814b811f6830621ee26d46936f4b (1 x Stealc) |
| ssdeep | 6144:KexH6CMNfI3oLEWkOC2n4aEYYWhVVCHtylV65UNvz:KexAfI3oLE2zLjVWgz65U1 |
| Threatray | 289 similar samples on MalwareBazaar |
| TLSH | T158748DD1A6F1A427F7F78A78593096B84D7BBCA3AB7C835E2610124E3D737828911713 |
| TrID | 46.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 25.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 8.5% (.EXE) Win64 Executable (generic) (10522/11/4) 5.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.0% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 0408090b060a0400 (1 x Stealc) |
| Reporter | |
| Tags: | exe Stealc |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://62.204.41.177/edd20096ecef326d.php | https://threatfox.abuse.ch/ioc/1339382/ |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::DeleteVolumeMountPointW KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::WriteConsoleA KERNEL32.dll::ReadConsoleOutputCharacterW KERNEL32.dll::SetConsoleTitleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleAliasW KERNEL32.dll::GetConsoleFontSize KERNEL32.dll::GetConsoleMode KERNEL32.dll::GetConsoleOutputCP |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateFileA KERNEL32.dll::MoveFileExA KERNEL32.dll::MoveFileW KERNEL32.dll::GetFileAttributesW KERNEL32.dll::GetSystemWow64DirectoryW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameA |
| WIN_HTTP_API | Uses HTTP services | WINHTTP.dll::WinHttpOpenRequest |
| WIN_SVC_API | Can Manipulate Windows Services | ADVAPI32.dll::QueryServiceLockStatusW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.