MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a89aa208ba0c1f5f19abf41c0218079bc3776189466a617210d9a4cf4886ee31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: a89aa208ba0c1f5f19abf41c0218079bc3776189466a617210d9a4cf4886ee31
SHA3-384 hash: 65e5ed20290dea5e6f63cc75959ea4c7a817471223cba07741ae909a559d9531b97f72fed720153d842f546596d3442d
SHA1 hash: 3817246c0404629a875930006c6a1ef667e2d860
MD5 hash: 70ed89139ccde0ec5839678bfd42deb5
humanhash: jupiter-tennis-india-princess
File name:70ED89139CCDE0EC5839678BFD42DEB5.exe
Download: download sample
Signature Stealc
File size:589'824 bytes
First seen:2023-04-16 21:20:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9a41e5de09e36d0b636c75ee2ffb06f1 (1 x Stealc)
ssdeep 6144:DFze/9tXLcCORJ7MQIL0aIhyMcs2a5te69+OGaeehu1P0e0ZWpL28VBWbEVqrn6v:C9tYCcQfGZcsV6Wm267KGT
Threatray 193 similar samples on MalwareBazaar
TLSH T1E0C47C1645A52D62EFD998BD4EB14D7CCABA0CD88B06D44C5A2B33940DB7EC95F8F02C
TrID 43.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
22.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.2% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon eccccc9cc4d8e8f4 (2 x SnakeKeylogger, 1 x GuLoader, 1 x BazaLoader)
Reporter abuse_ch
Tags:exe Stealc


Avatar
abuse_ch
Stealc C2:
http://193.109.85.62/43e18f2a3b646c54.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
268
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
70ED89139CCDE0EC5839678BFD42DEB5.exe
Verdict:
Malicious activity
Analysis date:
2023-04-16 21:22:35 UTC
Tags:
stealer loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Changing a file
Creating a file in the %AppData% subdirectories
Creating a window
Stealing user critical data
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Stealc, Vidar
Detection:
malicious
Classification:
troj.spyw
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Yara detected Stealc
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Stealc
Status:
Malicious
First seen:
2023-04-15 08:44:00 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
17 of 24 (70.83%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Unpacked files
SH256 hash:
2b2da91c85123b6c1379494d1e003d9aba8dfe2724cfabdf1986503691d2bdad
MD5 hash:
a1584e9e27411f0f1ab222660a29359f
SHA1 hash:
8e2a298c087e77de6c1cbd80f9b67896006c6bce
Detections:
win_stealc_auto win_stealc_a0
SH256 hash:
a89aa208ba0c1f5f19abf41c0218079bc3776189466a617210d9a4cf4886ee31
MD5 hash:
70ed89139ccde0ec5839678bfd42deb5
SHA1 hash:
3817246c0404629a875930006c6a1ef667e2d860
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments