MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a69a5586f44e36c4ad7f1c64c8157934c7b02bde63a59fa2f337b64b13a6b26b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 16


Intelligence 16 IOCs 1 YARA 12 File information Comments

SHA256 hash: a69a5586f44e36c4ad7f1c64c8157934c7b02bde63a59fa2f337b64b13a6b26b
SHA3-384 hash: 4842661260a2281a47fb5b6484b85bd625933185d8d8e8e47a1db451a100e146c60bc2d325b3b46cec6234d0cc79be1a
SHA1 hash: 3dabd3c7f4be26bf77d41bd1e16d805942274f1b
MD5 hash: 31d5dabf2040669581e6c27268c278c4
humanhash: oregon-edward-lima-golf
File name:31D5DABF2040669581E6C27268C278C4.exe
Download: download sample
Signature Stealc
File size:82'432 bytes
First seen:2026-01-23 07:15:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6a5a3919d6bebf63a6f776305bb77974 (1 x AsyncRAT, 1 x Stealc)
ssdeep 768:IlAZpYb8H106bHN+B3ez3n9lIyaD4hf+aFJkk4LEDRSn/AiVFi0o3AhRKBBRHSyp:IAS8HNN+BuX9MUXFJkNV7uAhoB2yH2U
Threatray 28 similar samples on MalwareBazaar
TLSH T1D5834A11F252C035F0F700BACBB54BBE9EAC6F10636850DF53D815A99B61AD2BA32357
TrID 56.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.1% (.EXE) Win32 Executable (generic) (4504/4/1)
3.7% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe Stealc


Avatar
abuse_ch
Stealc C2:
http://196.251.107.23/04ca1421433e0038.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://196.251.107.23/04ca1421433e0038.php https://threatfox.abuse.ch/ioc/1736007/

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
_a69a5586f44e36c4ad7f1c64c8157934c7b02bde63a59fa2f337b64b13a6b26b.exe
Verdict:
Malicious activity
Analysis date:
2026-01-23 07:35:17 UTC
Tags:
auto-sch

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun cobalt
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 carberp crypt evasive lolbin microsoft_visual_cc oficla packed schtasks unsafe xpack
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-19T22:12:00Z UTC
Last seen:
2026-01-23T07:54:00Z UTC
Hits:
~100
Detections:
Trojan.Gatak.TCP.C&C Backdoor.MSIL.Crysan.sb Trojan-PSW.Win32.Lumma.aaln VHO:Backdoor.MSIL.Agent.gen Trojan.Win32.Shellcode.sb Trojan.Win32.Mansabo.sb Trojan.Win32.AntiAV.sb Backdoor.MSIL.Crysan.d Trojan-PSW.Win64.StealC.sb Trojan.Win64.Agent.sb PDM:Trojan.Win32.Tasker.cust PDM:Exploit.Win32.Generic Trojan-Downloader.Bazloader.HTTP.C&C Trojan.Win32.Gatak.sb Backdoor.MSIL.Agent.sb Trojan-PSW.Lumma.HTTP.C&C Trojan.Win32.Inject.sb Trojan.Win32.RokRat.sb Trojan.MSIL.Crypt.sb Backdoor.MSIL.Crysan.c Backdoor.MSIL.Crysan.b Trojan-Downloader.Win32.Bazloader.jy Trojan-Banker.Win32.ClipBanker.sb Trojan.Win32.Agent.sb Backdoor.MSIL.Crysan.mjf PDM:Trojan.Win32.Generic Trojan-Spy.Agent.HTTP.C&C
Result
Threat name:
AsyncRAT, Clipboard Hijacker, RedLine, S
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Drops PE files with benign system names
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Unusual module load detection (module proxying)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected Clipboard Hijacker
Yara detected Generic Downloader
Yara detected RedLine Stealer
Yara detected Stealc v2
Yara detected TinyNuke
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1856191 Sample: 6cAbroxLpG.exe Startdate: 23/01/2026 Architecture: WINDOWS Score: 100 155 Suricata IDS alerts for network traffic 2->155 157 Found malware configuration 2->157 159 Malicious sample detected (through community Yara rule) 2->159 161 18 other signatures 2->161 11 6cAbroxLpG.exe 5 2->11         started        15 267488416802C0EC.exe 2->15         started        17 bcdefghi.exe 2->17         started        19 10 other processes 2->19 process3 file4 139 C:\Users\user\...\267488416802C0EC.exe, PE32 11->139 dropped 141 C:\...\267488416802C0EC.exe:Zone.Identifier, ASCII 11->141 dropped 201 Uses schtasks.exe or at.exe to add and modify task schedules 11->201 203 Writes to foreign memory regions 11->203 205 Allocates memory in foreign processes 11->205 21 svchost.exe 11 11->21         started        26 schtasks.exe 1 11->26         started        28 schtasks.exe 1 11->28         started        207 Multi AV Scanner detection for dropped file 15->207 209 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->209 211 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 15->211 30 iqygowem.tmp 15->30         started        213 Injects code into the Windows Explorer (explorer.exe) 17->213 215 Creates a thread in another existing process (thread injection) 17->215 217 Injects a PE file into a foreign processes 17->217 32 schtasks.exe 17->32         started        219 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 19->219 221 Found direct / indirect Syscall (likely to bypass EDR) 19->221 34 WerFault.exe 19->34         started        signatures5 process6 dnsIp7 147 62.60.226.159, 49690, 49691, 49692 ASLINE-AS-APASLINELIMITEDHK Iran (ISLAMIC Republic Of) 21->147 149 196.251.107.61, 49695, 49699, 49707 ANGANI-ASKE Seychelles 21->149 95 C:\Users\user\AppData\Local\...\tmfyrkdw.exe, PE32+ 21->95 dropped 97 C:\Users\user\AppData\Local\...\ocqesgui.exe, PE32 21->97 dropped 99 C:\Users\user\AppData\Local\...\iqygowem.exe, PE32 21->99 dropped 107 2 other malicious files 21->107 dropped 185 System process connects to network (likely due to code injection or exploit) 21->185 187 Unusual module load detection (module proxying) 21->187 36 tmfyrkdw.exe 21->36         started        39 ocqesgui.exe 2 21->39         started        42 bcdefghi.exe 21->42         started        52 2 other processes 21->52 44 conhost.exe 26->44         started        46 conhost.exe 28->46         started        101 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 30->101 dropped 103 C:\ProgramData\...\vcruntime140_1.dll (copy), PE32+ 30->103 dropped 105 C:\ProgramData\...\vcruntime140.dll (copy), PE32+ 30->105 dropped 109 10 other malicious files 30->109 dropped 48 FnHotkeyUtility.exe 30->48         started        50 conhost.exe 32->50         started        file8 signatures9 process10 file11 163 Multi AV Scanner detection for dropped file 36->163 165 Hijacks the control flow in another process 36->165 167 Writes to foreign memory regions 36->167 183 3 other signatures 36->183 54 HelpPane.exe 36->54         started        111 C:\Users\user\AppData\Local\...\ocqesgui.tmp, PE32 39->111 dropped 59 ocqesgui.tmp 3 5 39->59         started        169 Creates multiple autostart registry keys 42->169 171 Injects code into the Windows Explorer (explorer.exe) 42->171 173 Allocates memory in foreign processes 42->173 175 Creates a thread in another existing process (thread injection) 42->175 61 explorer.exe 42->61 injected 63 schtasks.exe 42->63         started        65 schtasks.exe 42->65         started        177 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 48->177 179 Found direct / indirect Syscall (likely to bypass EDR) 48->179 67 WerFault.exe 48->67         started        113 C:\Users\user\Pictures\svchost.exe, PE32+ 52->113 dropped 115 C:\Users\user\AppData\Local\...\iqygowem.tmp, PE32 52->115 dropped 181 Drops PE files with benign system names 52->181 69 iqygowem.tmp 52->69         started        signatures12 process13 dnsIp14 151 196.251.107.23, 49696, 49727, 49822 ANGANI-ASKE Seychelles 54->151 117 C:\Users\user\AppData\...\yQVggwzB3XBW.exe, PE32+ 54->117 dropped 119 C:\Users\user\AppData\...\tKIWruIh9eVr.exe, PE32 54->119 dropped 121 C:\Users\user\AppData\...\iGxvKkceFqf7.exe, PE32 54->121 dropped 129 9 other malicious files 54->129 dropped 189 Early bird code injection technique detected 54->189 191 Found many strings related to Crypto-Wallets (likely being stolen) 54->191 193 Tries to harvest and steal browser information (history, passwords, etc) 54->193 199 5 other signatures 54->199 71 chrome.exe 54->71         started        73 chrome.exe 54->73         started        75 chrome.exe 54->75         started        77 msedge.exe 54->77         started        123 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 59->123 dropped 125 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 59->125 dropped 79 ocqesgui.exe 2 59->79         started        195 Unusual module load detection (module proxying) 61->195 197 Switches to a custom stack to bypass stack traces 61->197 82 conhost.exe 63->82         started        84 conhost.exe 65->84         started        127 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 69->127 dropped 86 iqygowem.exe 69->86         started        file15 signatures16 process17 file18 143 C:\Users\user\AppData\Local\...\ocqesgui.tmp, PE32 79->143 dropped 88 ocqesgui.tmp 5 10 79->88         started        145 C:\Users\user\AppData\Local\...\iqygowem.tmp, PE32 86->145 dropped process19 file20 131 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 88->131 dropped 133 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 88->133 dropped 135 C:\ProgramData\...\vcruntime140.dll (copy), PE32 88->135 dropped 137 9 other malicious files 88->137 dropped 91 eServiceHost.exe 2 88->91         started        process21 dnsIp22 153 196.251.107.104, 6606, 7707, 8808 ANGANI-ASKE Seychelles 91->153 223 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 91->223 225 Unusual module load detection (module proxying) 91->225 signatures23
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.ExplorerHijack
Status:
Malicious
First seen:
2026-01-20 02:54:43 UTC
File Type:
PE (Exe)
AV detection:
30 of 36 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:redline family:stealc botnet:crypted botnet:default botnet:loaded adware discovery execution infostealer installer persistence pyinstaller rat spyware stealer upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies Internet Explorer Protected Mode
Modifies Internet Explorer Protected Mode Banner
Modifies Internet Explorer settings
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Inno Setup is an open-source installation builder for Windows applications.
Detects Pyinstaller
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in System32 directory
Suspicious use of SetThreadContext
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Async RAT payload
AsyncRat
Asyncrat family
RedLine
RedLine payload
Redline family
Stealc
Stealc family
Malware Config
C2 Extraction:
http://196.251.107.23
196.251.107.104:6606
196.251.107.104:7707
196.251.107.104:8808
196.251.107.104:1912
Unpacked files
SH256 hash:
a69a5586f44e36c4ad7f1c64c8157934c7b02bde63a59fa2f337b64b13a6b26b
MD5 hash:
31d5dabf2040669581e6c27268c278c4
SHA1 hash:
3dabd3c7f4be26bf77d41bd1e16d805942274f1b
Malware family:
Stealc.v2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MAL_packer_lb_was_detected
Author:0x0d4y
Description:Detect the packer used by Lockbit4.0
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPXProtectorv10x2
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments