MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82e68bb4f56181a0b2458f2861aa7b5fa1bb0f4ce30907d579c3b92707ef2647. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



WhiteSnakeStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: 82e68bb4f56181a0b2458f2861aa7b5fa1bb0f4ce30907d579c3b92707ef2647
SHA3-384 hash: 53335d304e385373e15a18030158f9c3ed2bb5603ec95f441b851e9c265de1c6fc48c69518d860e6268069eb3b7f7248
SHA1 hash: ab0e810472a897affac1a761b49595939f6897a9
MD5 hash: 7e9a93c69aecfc2bbda9470fbd4556db
humanhash: video-salami-idaho-pasta
File name:7e9a93c69aecfc2bbda9470fbd4556db.exe
Download: download sample
Signature WhiteSnakeStealer
File size:14'336 bytes
First seen:2024-02-10 15:15:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'660 x AgentTesla, 19'470 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 384:1R8wtU1eai/zbM/XygkxOu6cyhLWi1fXlSW:1eCU1vi7blHhyhiij
TLSH T12F522C3577E49637CABE0E7649B253404375EA068822DFDD2CC8600D5DD3B868562FB7
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe WhiteSnakeStealer


Avatar
abuse_ch
WhiteSnakeStealer C2:
185.119.118.59:8080

Intelligence


File Origin
# of uploads :
1
# of downloads :
545
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Verdict:
Malicious
Labled as:
MSIL/TrojanDownloader.Agent_AGen
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Gurcu Stealer, WhiteSnake Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Disables UAC (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Yara detected Gurcu Stealer
Yara detected Telegram RAT
Yara detected WhiteSnake Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1390172 Sample: jqOHOuPMJP.exe Startdate: 10/02/2024 Architecture: WINDOWS Score: 100 95 api.telegram.org 2->95 97 serveo.net 2->97 99 ip-api.com 2->99 113 Multi AV Scanner detection for domain / URL 2->113 115 Found malware configuration 2->115 117 Antivirus detection for URL or domain 2->117 121 11 other signatures 2->121 11 jqOHOuPMJP.exe 16 5 2->11         started        16 vkefq4cv.oil.exe 2->16         started        18 vkefq4cv.oil.exe 2->18         started        20 3 other processes 2->20 signatures3 119 Uses the Telegram API (likely for C&C communication) 95->119 process4 dnsIp5 109 82.147.85.194, 49729, 80 SIBTEL-ASRU Russian Federation 11->109 93 C:\Users\user\AppData\...\vkefq4cv.oil.exe, PE32 11->93 dropped 143 Adds a directory exclusion to Windows Defender 11->143 145 Disables UAC (registry) 11->145 22 vkefq4cv.oil.exe 6 11->22         started        26 powershell.exe 22 11->26         started        147 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->147 149 Tries to steal Mail credentials (via file / registry access) 16->149 151 Tries to harvest and steal browser information (history, passwords, etc) 16->151 153 Tries to harvest and steal WLAN passwords 16->153 28 cmd.exe 16->28         started        30 cmd.exe 16->30         started        32 ssh.exe 16->32         started        34 WerFault.exe 16->34         started        file6 signatures7 process8 file9 91 C:\Users\user\AppData\...\vkefq4cv.oil.exe, PE32 22->91 dropped 129 Machine Learning detection for dropped file 22->129 131 Found many strings related to Crypto-Wallets (likely being stolen) 22->131 36 cmd.exe 1 22->36         started        39 WmiPrvSE.exe 26->39         started        41 conhost.exe 26->41         started        133 Tries to harvest and steal WLAN passwords 28->133 43 conhost.exe 28->43         started        45 chcp.com 28->45         started        47 netsh.exe 28->47         started        49 findstr.exe 28->49         started        53 4 other processes 30->53 51 conhost.exe 32->51         started        signatures10 process11 signatures12 123 Uses schtasks.exe or at.exe to add and modify task schedules 36->123 125 Uses netsh to modify the Windows network and firewall settings 36->125 127 Tries to harvest and steal WLAN passwords 36->127 55 vkefq4cv.oil.exe 14 5 36->55         started        59 conhost.exe 36->59         started        61 timeout.exe 1 36->61         started        63 2 other processes 36->63 process13 dnsIp14 103 ip-api.com 208.95.112.1, 49737, 49739, 80 TUT-ASUS United States 55->103 105 api.telegram.org 149.154.167.220, 443, 49743, 49744 TELEGRAMRU United Kingdom 55->105 107 2 other IPs or domains 55->107 135 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 55->135 137 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 55->137 139 Tries to steal Mail credentials (via file / registry access) 55->139 141 3 other signatures 55->141 65 cmd.exe 55->65         started        68 cmd.exe 55->68         started        70 ssh.exe 55->70         started        signatures15 process16 dnsIp17 111 Tries to harvest and steal WLAN passwords 65->111 73 conhost.exe 65->73         started        75 chcp.com 65->75         started        77 netsh.exe 65->77         started        79 findstr.exe 65->79         started        81 conhost.exe 68->81         started        83 chcp.com 68->83         started        85 netsh.exe 68->85         started        87 findstr.exe 68->87         started        101 serveo.net 138.68.79.95, 22, 49740, 49742 DIGITALOCEAN-ASNUS United States 70->101 89 conhost.exe 70->89         started        signatures18 process19
Verdict:
malicious
Result
Malware family:
n/a
Score:
  10/10
Tags:
collection discovery evasion spyware stealer trojan
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Accesses Microsoft Outlook profiles
Checks installed software on the system
Checks whether UAC is enabled
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UAC bypass
Unpacked files
SH256 hash:
82e68bb4f56181a0b2458f2861aa7b5fa1bb0f4ce30907d579c3b92707ef2647
MD5 hash:
7e9a93c69aecfc2bbda9470fbd4556db
SHA1 hash:
ab0e810472a897affac1a761b49595939f6897a9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:MSIL_TinyDownloader_Generic
Author:albertzsigovits
Description:Detects small-sized dotNET downloaders
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

WhiteSnakeStealer

Executable exe 82e68bb4f56181a0b2458f2861aa7b5fa1bb0f4ce30907d579c3b92707ef2647

(this sample)

  
Delivery method
Distributed via web download

Comments