MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 785c32a65738f3aff0a7dcf1e12f0f852a7e517672e8c18172d6e59bcb2ce0ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 16


Intelligence 16 IOCs YARA 24 File information Comments

SHA256 hash: 785c32a65738f3aff0a7dcf1e12f0f852a7e517672e8c18172d6e59bcb2ce0ef
SHA3-384 hash: 8b97b33ca1eac0ab0ccd82c39ec1cad5e9f1eddb77ea54c73079751b31ed3794f34c4c9a54f367967f4d513f1da4de9a
SHA1 hash: eecbeee26a05d0db9058f2509a5e1aa275a00dc9
MD5 hash: db9948099f3d8d9b1d660b54407ded0b
humanhash: march-emma-oven-delta
File name:db9948099f3d8d9b1d660b54407ded0b.exe
Download: download sample
Signature Stealc
File size:7'079'936 bytes
First seen:2025-03-18 21:30:15 UTC
Last seen:2025-03-18 22:27:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3c029866402cd0e87160c4e37f17636e (3 x LummaStealer, 1 x Stealc)
ssdeep 196608:4egzDlFOWIrSz8ak0dhnlKdX6MKIL7/VHe:4PSWOSFgFKIPN
Threatray 158 similar samples on MalwareBazaar
TLSH T13E661220338541D7E94CBEB6A01BF37A06CBF566C266CC4A89CF0FAB46C7F59442C656
TrID 49.9% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win32 Executable (generic) (4504/4/1)
9.6% (.EXE) OS/2 Executable (generic) (2029/13)
9.5% (.EXE) Generic Win/DOS Executable (2002/3)
9.4% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon b2ae96aa9a968eb2 (1 x Stealc)
Reporter abuse_ch
Tags:exe Stealc


Avatar
abuse_ch
Stealc C2:
http://45.93.20.64/96d56f5c90701384.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
492
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
db9948099f3d8d9b1d660b54407ded0b.exe
Verdict:
Malicious activity
Analysis date:
2025-03-18 21:32:20 UTC
Tags:
stealer stealc loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
bitcoin dropper lien sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Connecting to a non-recommended domain
Connection attempt
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Launching a process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context crypto packed packed packer_detected
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Stealc, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Powershell download and execute
Yara detected Stealc
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1642158 Sample: De5T3PrGUQ.exe Startdate: 18/03/2025 Architecture: WINDOWS Score: 100 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 7 other signatures 2->53 7 De5T3PrGUQ.exe 35 2->7         started        process3 dnsIp4 41 45.93.20.64, 49714, 49741, 80 COGENT-174US Netherlands 7->41 43 127.0.0.1 unknown unknown 7->43 23 C:\ProgramData\nss3.dll, PE32 7->23 dropped 25 C:\Users\user\AppData\...\places.sqlite-shm, data 7->25 dropped 27 C:\Users\user\AppData\...\cookies.sqlite-shm, data 7->27 dropped 29 11 other files (none is malicious) 7->29 dropped 55 Attempt to bypass Chrome Application-Bound Encryption 7->55 57 Found many strings related to Crypto-Wallets (likely being stolen) 7->57 59 Tries to harvest and steal ftp login credentials 7->59 61 4 other signatures 7->61 12 chrome.exe 7->12         started        15 WerFault.exe 21 16 7->15         started        18 WerFault.exe 16 7->18         started        file5 signatures6 process7 dnsIp8 45 192.168.2.4, 138, 443, 49471 unknown unknown 12->45 20 chrome.exe 12->20         started        31 C:\ProgramData\Microsoft\...\Report.wer, Unicode 15->31 dropped 33 C:\ProgramData\Microsoft\...\Report.wer, Unicode 18->33 dropped file9 process10 dnsIp11 35 play.google.com 142.250.185.110, 443, 49742 GOOGLEUS United States 20->35 37 www.google.com 142.250.186.68, 443, 49720, 49721 GOOGLEUS United States 20->37 39 2 other IPs or domains 20->39
Threat name:
Win32.Trojan.SpywareX
Status:
Malicious
First seen:
2025-03-18 21:31:12 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:stealc botnet:default credential_access discovery spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Downloads MZ/PE file
Uses browser remote debugging
Stealc
Stealc family
Verdict:
Suspicious
Tags:
stealer stealc
YARA:
n/a
Unpacked files
SH256 hash:
785c32a65738f3aff0a7dcf1e12f0f852a7e517672e8c18172d6e59bcb2ce0ef
MD5 hash:
db9948099f3d8d9b1d660b54407ded0b
SHA1 hash:
eecbeee26a05d0db9058f2509a5e1aa275a00dc9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of MFA browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:infostealer_win_stealc_standalone
Description:Find standalone Stealc sample based on decryption routine or characteristic strings
Reference:https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:malware_Stealc_str
Author:JPCERT/CC Incident Response Group
Description:Stealc infostealer
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Stealc
Author:kevoreilly
Description:Stealc Payload
Rule name:Stealer_Stealc
Author:Still
Description:attempts to match instructions/strings found in Stealc
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Generic_Threat_2bba6bae
Author:Elastic Security
Rule name:win_stealc_generic
Author:dubfib
Rule name:win_stealc_w0
Author:crep1x
Description:Find standalone Stealc sample based on decryption routine or characteristic strings
Reference:https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe 785c32a65738f3aff0a7dcf1e12f0f852a7e517672e8c18172d6e59bcb2ce0ef

(this sample)

  
Delivery method
Distributed via web download

Comments