MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a16bac102cd51614f5629f28bac9ab867ed8bec0d37ee26904b78a4aaab82253. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 17
| SHA256 hash: | a16bac102cd51614f5629f28bac9ab867ed8bec0d37ee26904b78a4aaab82253 |
|---|---|
| SHA3-384 hash: | 31a588a292c06386e84de26731c0389ad64631fe04c5b8e099718ed05a448fc83715aea305f6bd8066db971a79322942 |
| SHA1 hash: | 738a29de8c4020de9b54a574a5011cda468bf274 |
| MD5 hash: | 8323e9372d528ae4e4b53d97dac3ff7e |
| humanhash: | mississippi-low-zebra-bacon |
| File name: | 8323e9372d528ae4e4b53d97dac3ff7e.exe |
| Download: | download sample |
| Signature | Stealc |
| File size: | 211'968 bytes |
| First seen: | 2024-10-02 20:55:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3983cab1c294af24b06d123197d37d73 (1 x Stealc) |
| ssdeep | 3072:VLdMNw/b5F9LWHmYa9LVkdBN5fufKl/B3:VLKNCD+m9LVwLr |
| TLSH | T1722438713AF5D027EFF70B35CAB496A41A3BBC626B70409E3690B60F1A73290496D717 |
| TrID | 46.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 25.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 8.5% (.EXE) Win64 Executable (generic) (10523/12/4) 5.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.0% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 9671e8d6ccd0d4d4 (1 x Stealc) |
| Reporter | |
| Tags: | exe Stealc |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://45.91.202.84/317f94f0db7b7e68.php | https://threatfox.abuse.ch/ioc/1332751/ |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
5a9e6a5684dcc534e429359d81d83d3221665a87eafd584649de664d78ea434d
a641af0462259586cf10b8867653e163f73b6066106455605643b08ab829ac77
ce434bc783d75cceafbddd59dd3ed43d4bf1811e0344ba5fdc6958af146254e7
2c84b412d0ab9a058d88e5b34e0921c06da1ba11703ef71c124050406dad1844
a16bac102cd51614f5629f28bac9ab867ed8bec0d37ee26904b78a4aaab82253
d983c149edd9a0327e4849ccad36a03cf1e65a90455a17d1cd33e299e3c0c955
e2a7f3f96c3d37c121939e293c68ed5a49d9c3a0ae30e646430e7c8f04338f40
e684bed5b84f09dd85a88a7847fb4aaed9845f9b8098f0dda486a095a3115d4c
fff79a1e96ffcac77b3eb7bc01706bfece7499ab8972b28a732dfa2aa09994ee
ac144e9f1542dab21d48b0ae7ffb52230bef5583c546b6b9528cc5e8d8752e7c
79a57ce64cf1aadccd3f1b74686209416ef9c4cd45d4ac9b28ff9ea016ec8955
6dae626cd4840dddef5d9581045fbd59b761fa0df26746e29f4d7994d816369a
e93bc7594d1fc8ca1eff0e522b8547e74b3ac33840c55b4f50f69278e4cd8242
67cca8e76698d506703867218d35889e503f8ab35200e0cec204df1df3ed1ee3
ce39271335727cb252102e59f53dedb8880fb3dca8f597bdf7e5d35c6d605de0
8001af6bbc3cc10b1382c5efc800e479804ad1e30f0d99a57add656a811afbcd
ec901da405ea52104876cb36ddc08b640c68b14512a0d828027bcf4835dd61ed
8b5a6222cc080ae55c33fcba26b2f999184d0995975eb181da803585c9a56bdb
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | pe_detect_tls_callbacks |
|---|
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::ObjectPrivilegeAuditAlarmA |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetVolumeInformationA KERNEL32.dll::GetStartupInfoW KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetCommandLineW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleOutputA KERNEL32.dll::WriteConsoleOutputAttribute KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetConsoleMode KERNEL32.dll::GetConsoleAliasesLengthW KERNEL32.dll::GetConsoleAliasExesLengthA |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::MoveFileA KERNEL32.dll::GetFileAttributesA |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameA KERNEL32.dll::QueryDosDeviceW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.