MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 822d4a0dc03fa0348fc8a12c3e0c3c10ad433abbf34f858b64406beaf8606d87. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 19


Intelligence 19 IOCs 1 YARA 3 File information Comments

SHA256 hash: 822d4a0dc03fa0348fc8a12c3e0c3c10ad433abbf34f858b64406beaf8606d87
SHA3-384 hash: 6d0735ef0ca869b0fd989323ffae9fd874dfc53aa0ce16126e45086d28be767a495711abf178ea94d8dd28d02ddd4fe1
SHA1 hash: 60c61650311944accdaf8fb78bca663d8cdde241
MD5 hash: 9753b8ad3204443226a2b298da8242be
humanhash: march-steak-texas-sweet
File name:9753b8ad3204443226a2b298da8242be.exe
Download: download sample
Signature Stealc
File size:421'376 bytes
First seen:2024-09-02 00:15:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 68ea79aa2f3fa0077d4466d6e381bfbe (2 x Stealc)
ssdeep 6144:KsL00ZALltugI4avTmF1Y58qg3h58A9rFo:KORZALltIm28d3hOAw
Threatray 2'306 similar samples on MalwareBazaar
TLSH T12994AF12E2E1FC64E5624A31DDEEC6E4672EB9514F3526BB32287F2F18703A1C56231D
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon 1a72c2db98585c0c (9 x Stealc, 6 x Tofsee, 5 x Smoke Loader)
Reporter abuse_ch
Tags:exe Stealc


Avatar
abuse_ch
Stealc C2:
http://91.202.233.158/e96ea2db21fa9a1b.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://91.202.233.158/e96ea2db21fa9a1b.php https://threatfox.abuse.ch/ioc/1319349/

Intelligence


File Origin
# of uploads :
1
# of downloads :
451
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9753b8ad3204443226a2b298da8242be.exe
Verdict:
Malicious activity
Analysis date:
2024-09-02 00:16:39 UTC
Tags:
loader smokeloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
Network Stealth
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Connection attempt
Sending an HTTP POST request
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc fingerprint microsoft_visual_cc packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
CryptOne, SmokeLoader, Stealc
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Found malware configuration
Found stalling execution ending in API Sleep call
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected CryptOne packer
Yara detected Powershell download and execute
Yara detected SmokeLoader
Yara detected Stealc
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502576 Sample: V6n3oygctH.exe Startdate: 02/09/2024 Architecture: WINDOWS Score: 100 77 nicetolosv.xyz 2->77 79 ycMmBvpGeMcYHBMfFqkIrUsoh.ycMmBvpGeMcYHBMfFqkIrUsoh 2->79 81 5 other IPs or domains 2->81 93 Multi AV Scanner detection for domain / URL 2->93 95 Suricata IDS alerts for network traffic 2->95 97 Found malware configuration 2->97 101 14 other signatures 2->101 10 V6n3oygctH.exe 2->10         started        13 ecitguv 2->13         started        15 ecitguv 2->15         started        17 wscript.exe 2->17         started        signatures3 99 Performs DNS queries to domains with low reputation 77->99 process4 signatures5 129 Detected unpacking (changes PE section rights) 10->129 131 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->131 133 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->133 141 3 other signatures 10->141 19 explorer.exe 73 12 10->19 injected 135 Multi AV Scanner detection for dropped file 13->135 137 Machine Learning detection for dropped file 13->137 139 Maps a DLL or memory area into another process 13->139 process6 dnsIp7 83 94.228.169.44, 49755, 80 SSERVICE-ASRU Russian Federation 19->83 85 free.cdn.hstgr.net 84.32.84.249, 443, 49764 NTT-LT-ASLT Lithuania 19->85 87 epohe.ru 211.181.24.132, 49737, 49738, 49739 LGDACOMLGDACOMCorporationKR Korea Republic of 19->87 65 C:\Users\user\AppData\Roaming\ecitguv, PE32 19->65 dropped 67 C:\Users\user\AppData\Local\Temp\9EFF.exe, PE32 19->67 dropped 69 C:\Users\user\AppData\Local\Temp\5316.exe, PE32 19->69 dropped 71 C:\Users\user\...\ecitguv:Zone.Identifier, ASCII 19->71 dropped 107 System process connects to network (likely due to code injection or exploit) 19->107 109 Benign windows process drops PE files 19->109 111 Deletes itself after installation 19->111 113 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->113 24 9EFF.exe 23 19->24         started        27 5316.exe 1 19->27         started        30 wscript.exe 19->30         started        32 2 other processes 19->32 file8 signatures9 process10 file11 115 Machine Learning detection for dropped file 24->115 117 Found stalling execution ending in API Sleep call 24->117 34 cmd.exe 2 24->34         started        73 C:\Users\user\AppData\...\svchost015.exe, PE32 27->73 dropped 119 Multi AV Scanner detection for dropped file 27->119 121 Contains functionality to inject code into remote processes 27->121 123 Writes to foreign memory regions 27->123 127 3 other signatures 27->127 38 svchost015.exe 13 27->38         started        125 Windows Scripting host queries suspicious COM object (likely to drop second stage) 30->125 41 SwiftServe.scr 30->41         started        75 C:\Users\user\AppData\...\SwiftServe.url, MS 32->75 dropped 43 conhost.exe 32->43         started        45 schtasks.exe 32->45         started        47 conhost.exe 32->47         started        signatures12 process13 dnsIp14 63 C:\Users\user\AppData\Local\Temp\...\Burn.pif, PE32 34->63 dropped 103 Drops PE files with a suspicious file extension 34->103 105 Uses schtasks.exe or at.exe to add and modify task schedules 34->105 49 Burn.pif 34->49         started        53 conhost.exe 34->53         started        55 tasklist.exe 1 34->55         started        57 7 other processes 34->57 89 91.202.233.158, 49766, 80 M247GB Russian Federation 38->89 file15 signatures16 process17 file18 59 C:\Users\user\AppData\...\SwiftServe.scr, PE32 49->59 dropped 61 C:\Users\user\AppData\Local\...\SwiftServe.js, ASCII 49->61 dropped 91 Drops PE files with a suspicious file extension 49->91 signatures19
Threat name:
Win32.Trojan.Operaloader
Status:
Malicious
First seen:
2024-09-02 00:16:11 UTC
File Type:
PE (Exe)
Extracted files:
38
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:pub1 backdoor discovery trojan
Behaviour
Checks SCSI registry key(s)
Program crash
System Location Discovery: System Language Discovery
SmokeLoader
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
822d4a0dc03fa0348fc8a12c3e0c3c10ad433abbf34f858b64406beaf8606d87
MD5 hash:
9753b8ad3204443226a2b298da8242be
SHA1 hash:
60c61650311944accdaf8fb78bca663d8cdde241
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_Nimplant_PE
Author:daniyyell
Description:Detects malicious nimplant variant PE malware.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe 822d4a0dc03fa0348fc8a12c3e0c3c10ad433abbf34f858b64406beaf8606d87

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::SetProcessShutdownParameters
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetDiskFreeSpaceExA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::PeekConsoleInputA
KERNEL32.dll::ReadConsoleInputW
KERNEL32.dll::SetConsoleCP
KERNEL32.dll::GetConsoleAliasExesW
KERNEL32.dll::GetConsoleAliasExesLengthW
KERNEL32.dll::GetConsoleDisplayMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateHardLinkA
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::GetFileAttributesW
KERNEL32.dll::GetTempPathA
KERNEL32.dll::SetVolumeMountPointA
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::QueryDosDeviceW

Comments