MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b9bf691af40a700843faa35d09f6c8db2e93c5b08d4e52fc7f01a7ccc05f9aed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: b9bf691af40a700843faa35d09f6c8db2e93c5b08d4e52fc7f01a7ccc05f9aed
SHA3-384 hash: 27ac18ce0122551b79f6763c1df19b93b4f67631ba19f5059caae39cbafa4fda624f0ce74334d37b00c5639046c481c0
SHA1 hash: f72b235eb9c5af0876c8aa6139af9190eccc4baf
MD5 hash: 68780846da767e6afcd73b9c3a6c9bf6
humanhash: whiskey-papa-orange-yellow
File name:pnk111.zip
Download: download sample
Signature Stealc
File size:14'945'391 bytes
First seen:2024-09-25 14:12:51 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 393216:11ux+K7fsUAIro1TY/+MmHNLNLDStylqzpZsTdXx:TfaL6TsgtNLDSiqlqpXx
TLSH T109E63320FE66E9DBD5907636ECA75E083337E09BC715071382A90479CEEA3192DCF586
Magika zip
Reporter NDA0E
Tags:file-pumped LummaStealer Stealc zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
183
Origin country :
NL NL
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:setup-email.exe
Pumped file This file is pumped. MalwareBazaar has de-pumped it.
File size:792'488'449 bytes
SHA256 hash: 5bbb69f42a2b5c9e8325f6fed79cf17f90637ee949e661c0ae631617def3626d
MD5 hash: 5abff83b191c0f33bd7c8dfb7d151219
De-pumped file size:53'242'368 bytes (Vs. original size of 792'488'449 bytes)
De-pumped SHA256 hash: cb61710acdb043ed835a814bfd4f3c960a78cffa156e2c7df81de2168930efac
De-pumped MD5 hash: 9e367ec7e01f8c0d5af67ec67113b13b
MIME type:application/x-dosexec
Signature Stealc
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
Discovery Execution Generic Network Stealth Trojan Emotet Gumen
Result
Verdict:
Malicious
File Type:
ZIP File - Malicious
Behaviour
SuspiciousEmbeddedObjects detected
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
golang installer large-file overlay
Threat name:
Win64.Trojan.Lazy
Status:
Malicious
First seen:
2024-09-25 14:13:20 UTC
File Type:
Binary (Archive)
Extracted files:
14
AV detection:
8 of 23 (34.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:lumma family:stealc botnet:c1 discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Drops startup file
Executes dropped EXE
Downloads MZ/PE file
Lumma Stealer, LummaC
Stealc
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://45.200.149.53
https://racedsuitreow.shop/api
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_Malicious_VBScript_Base64
Author:daniyyell
Description:Detects malicious VBScript patterns, including Base64 decoding, file operations, and PowerShell.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

zip b9bf691af40a700843faa35d09f6c8db2e93c5b08d4e52fc7f01a7ccc05f9aed

(this sample)

  
Delivery method
Distributed via web download

Comments