MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 95975615eb1d0194e9ed527770f247e241194a3ad66ae2294a8939a216ae3ad2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 16


Intelligence 16 IOCs YARA 1 File information Comments 1

SHA256 hash: 95975615eb1d0194e9ed527770f247e241194a3ad66ae2294a8939a216ae3ad2
SHA3-384 hash: 53d1f0c11974a924edb7fbf9075248db92d424e9fcd780278a03d5f6addf097ce140ba2741481bb8bb692ba733b4b69b
SHA1 hash: 10f397782a2948cee1e2053ef12986dcf0481f20
MD5 hash: 5f8b84b8a2e43b3f3c20fad2c71bef4e
humanhash: carpet-apart-hotel-arizona
File name:5f8b84b8a2e43b3f3c20fad2c71bef4e
Download: download sample
Signature Stealc
File size:37'376 bytes
First seen:2024-01-04 08:05:25 UTC
Last seen:2024-01-14 04:30:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 768:3E45SLnQpEhOB/hAGflc5xOXhr7gvexzv36:3E4EqEhOPNfqStgvexzv3
TLSH T1C5F2D08A1C219A78FE1542F7169C8FD4533DD8CB61F3AF4D4A36893764CB7B482342A9
TrID 42.6% (.EXE) Win32 Executable (generic) (4505/5/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
18.9% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
0.2% (.VXD) VXD Driver (29/21)
Reporter zbetcheckin
Tags:32 exe Stealc

Intelligence


File Origin
# of uploads :
2
# of downloads :
372
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
c2c188e1268c54261a51deaee8c99af06ec604bf7e873c88e01e3b3d95e0d028.exe
Verdict:
Malicious activity
Analysis date:
2024-01-04 07:45:12 UTC
Tags:
loader smoke smokeloader stealer vidar risepro evasion redline stealc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending a custom TCP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching a process
Creating a window
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, Petite Virus, RedLine, SmokeLo
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contain functionality to detect virtual machines
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops large PE files
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
UAC bypass detected (Fodhelper)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected Petite Virus
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Stealc
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1369685 Sample: ZC0CVbfY1v.exe Startdate: 04/01/2024 Architecture: WINDOWS Score: 100 152 host-host-file8.com 2->152 154 host-file-host6.com 2->154 156 13 other IPs or domains 2->156 186 Snort IDS alert for network traffic 2->186 188 Multi AV Scanner detection for domain / URL 2->188 190 Found malware configuration 2->190 192 22 other signatures 2->192 14 ZC0CVbfY1v.exe 2->14         started        17 avhvubg 2->17         started        19 uwhvubg 2->19         started        21 2 other processes 2->21 signatures3 process4 signatures5 250 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->250 252 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 14->252 254 Maps a DLL or memory area into another process 14->254 23 explorer.exe 14 12 14->23 injected 256 Detected unpacking (changes PE section rights) 17->256 258 Injects a PE file into a foreign processes 17->258 28 avhvubg 17->28         started        260 Checks if the current machine is a virtual machine (disk enumeration) 19->260 262 Creates a thread in another existing process (thread injection) 19->262 process6 dnsIp7 160 185.215.113.68, 49735, 80 WHOLESALECONNECTIONSNL Portugal 23->160 162 5.42.65.125, 49739, 80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 23->162 164 5 other IPs or domains 23->164 126 C:\Users\user\AppData\Roaming\uwhvubg, PE32 23->126 dropped 128 C:\Users\user\AppData\Roaming\avhvubg, PE32 23->128 dropped 130 C:\Users\user\AppData\Local\Temp\CC79.exe, PE32 23->130 dropped 132 2 other files (1 malicious) 23->132 dropped 210 System process connects to network (likely due to code injection or exploit) 23->210 212 Benign windows process drops PE files 23->212 214 Found many strings related to Crypto-Wallets (likely being stolen) 23->214 224 2 other signatures 23->224 30 FBA8.exe 7 23->30         started        33 CC79.exe 4 23->33         started        216 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 28->216 218 Maps a DLL or memory area into another process 28->218 220 Checks if the current machine is a virtual machine (disk enumeration) 28->220 222 Creates a thread in another existing process (thread injection) 28->222 file8 signatures9 process10 file11 142 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 30->142 dropped 144 C:\Users\user\AppData\Local\Temp\etopt.exe, PE32 30->144 dropped 146 C:\...\31839b57a4f11171d6abc8bbc4451ee4.exe, PE32 30->146 dropped 150 2 other files (none is malicious) 30->150 dropped 36 tuc4.exe 30->36         started        39 InstallSetup8.exe 1 41 30->39         started        42 toolspub2.exe 30->42         started        49 4 other processes 30->49 148 C:\Users\user\AppData\...\Protect544cd51a.dll, PE32 33->148 dropped 178 Writes to foreign memory regions 33->178 180 Allocates memory in foreign processes 33->180 182 Sample uses process hollowing technique 33->182 184 Injects a PE file into a foreign processes 33->184 45 MSBuild.exe 8 4 33->45         started        47 MSBuild.exe 33->47         started        signatures12 process13 dnsIp14 98 C:\Users\user\AppData\Local\Temp\...\tuc4.tmp, PE32 36->98 dropped 51 tuc4.tmp 36->51         started        166 zonealarm.com 209.87.209.205 ZONEALARM-COMUS United States 39->166 168 api4.ipify.org 104.237.62.212 WEBNXUS United States 39->168 176 3 other IPs or domains 39->176 100 C:\Users\user\AppData\...\nsq2F7B.tmp.exe, PE32 39->100 dropped 102 C:\Users\user\AppData\Local\...\INetC.dll, PE32 39->102 dropped 104 C:\Users\user\AppData\...\BroomSetup.exe, PE32 39->104 dropped 106 C:\Users\user\AppData\...\syncUpd[1].exe, PE32 39->106 dropped 53 nsq2F7B.tmp.exe 39->53         started        58 BroomSetup.exe 39->58         started        226 Detected unpacking (changes PE section rights) 42->226 228 Contains functionality to inject code into remote processes 42->228 230 Injects a PE file into a foreign processes 42->230 60 toolspub2.exe 42->60         started        170 195.20.16.103, 20440, 49740 EITADAT-ASFI Finland 45->170 232 Found many strings related to Crypto-Wallets (likely being stolen) 45->232 234 Tries to harvest and steal browser information (history, passwords, etc) 45->234 236 Tries to steal Crypto Currency Wallets 45->236 238 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 47->238 240 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 47->240 172 192.186.7.211 FEDERAL-ONLINE-GROUP-LLCUS United States 49->172 174 38.6.193.13 COGENT-174US United States 49->174 108 C:\Windows\Microsoft.NET\authman\RarExt.dll, PE32+ 49->108 dropped 110 C:\Users\user\AppData\Local\Temp\...\Zip.dll, PE32 49->110 dropped 112 C:\Users\user\AppData\Local\...\Checker.dll, PE32 49->112 dropped 114 2 other files (none is malicious) 49->114 dropped 242 Detected unpacking (overwrites its own PE header) 49->242 244 UAC bypass detected (Fodhelper) 49->244 246 Query firmware table information (likely to detect VMs) 49->246 248 4 other signatures 49->248 62 cmd.exe 49->62         started        64 WmiPrvSE.exe 49->64         started        file15 signatures16 process17 dnsIp18 66 tuc4.exe 51->66         started        158 185.172.128.79 NADYMSS-ASRU Russian Federation 53->158 118 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 53->118 dropped 120 C:\Users\user\AppData\...\softokn3[1].dll, PE32 53->120 dropped 122 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 53->122 dropped 124 9 other files (none is malicious) 53->124 dropped 194 Detected unpacking (changes PE section rights) 53->194 196 Detected unpacking (overwrites its own PE header) 53->196 198 Tries to steal Mail credentials (via file / registry access) 53->198 208 3 other signatures 53->208 200 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 60->200 202 Maps a DLL or memory area into another process 60->202 204 Checks if the current machine is a virtual machine (disk enumeration) 60->204 206 Creates a thread in another existing process (thread injection) 60->206 69 fodhelper.exe 62->69         started        71 conhost.exe 62->71         started        73 fodhelper.exe 62->73         started        75 fodhelper.exe 62->75         started        file19 signatures20 process21 file22 96 C:\Users\user\AppData\Local\Temp\...\tuc4.tmp, PE32 66->96 dropped 77 tuc4.tmp 66->77         started        81 31839b57a4f11171d6abc8bbc4451ee4.exe 69->81         started        process23 file24 134 C:\Program Files (x86)\...\datapumpcrt.exe, PE32 77->134 dropped 136 C:\Program Files (x86)\...\is-UF9KA.tmp, PE32 77->136 dropped 138 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 77->138 dropped 140 99 other files (none is malicious) 77->140 dropped 264 Drops large PE files 77->264 83 net.exe 77->83         started        85 datapumpcrt.exe 77->85         started        88 powershell.exe 81->88         started        signatures25 process26 file27 90 conhost.exe 83->90         started        92 net1.exe 83->92         started        116 C:\ProgramData\...\Bytematrix74.exe, PE32 85->116 dropped 94 conhost.exe 88->94         started        process28
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2024-01-04 06:17:59 UTC
File Type:
PE (Exe)
AV detection:
29 of 37 (78.38%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader botnet:up3 backdoor evasion trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Runs regedit.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of UnmapMainImage
Uses Task Scheduler COM API
NSIS installer
Legitimate hosting services abused for malware hosting/C2
Deletes itself
Downloads MZ/PE file
Modifies Windows Firewall
SmokeLoader
Malware Config
C2 Extraction:
http://185.215.113.68/fks/index.php
Unpacked files
SH256 hash:
95975615eb1d0194e9ed527770f247e241194a3ad66ae2294a8939a216ae3ad2
MD5 hash:
5f8b84b8a2e43b3f3c20fad2c71bef4e
SHA1 hash:
10f397782a2948cee1e2053ef12986dcf0481f20
Detections:
SmokeLoaderStage2 win_smokeloader_a2
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_no_import_table
Description:Detect pe file that no import table

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe 95975615eb1d0194e9ed527770f247e241194a3ad66ae2294a8939a216ae3ad2

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-01-04 08:05:26 UTC

url : hxxp://77.91.124.172/files/lodir.exe