MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 85fe9f67ab85bf222a82b13ff37cc0e3a2a88d73f2446e47ed6e7e88cf6b0f83. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 13
| SHA256 hash: | 85fe9f67ab85bf222a82b13ff37cc0e3a2a88d73f2446e47ed6e7e88cf6b0f83 |
|---|---|
| SHA3-384 hash: | 3358b30a45e1bad7e1b096afa87dc7c92bd6d35c1385a58f74f9bd8a7a16b8f2f5cc222dfb9f67380d4a917adaa89ba7 |
| SHA1 hash: | 9bcf3ee176b1755fe6ed088aa31409821e8f24aa |
| MD5 hash: | 292cf186b9046c3582b9dfa6ac9d1ea4 |
| humanhash: | december-mike-johnny-high |
| File name: | file |
| Download: | download sample |
| Signature | Stealc |
| File size: | 271'360 bytes |
| First seen: | 2023-11-19 06:17:49 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c641dbd6770cebe481abc8b5144dfbb8 (2 x Smoke Loader, 1 x Stealc, 1 x Vidar) |
| ssdeep | 3072:cLgwKGdk4Gc2Hq8DeIyb+BxSumEo2BUhNl0XRyUI9y7ovb3Trh6:q7dkJcT8Cdi2Eo2qnlUI9SMrT |
| TLSH | T1EA449D2329D3AC31C45643714E2D9AECB72E77227E67877B27161E5BD9302B1D61B302 |
| TrID | 45.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.4% (.EXE) Win64 Executable (generic) (10523/12/4) 9.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.6% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0020809010301000 (1 x Stealc) |
| Reporter | |
| Tags: | exe Stealc |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.