MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e80e120da34729c9fb7e7d4a684a7260f1346696ee8b3b514b6e512ebfa1bea4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 16
| SHA256 hash: | e80e120da34729c9fb7e7d4a684a7260f1346696ee8b3b514b6e512ebfa1bea4 |
|---|---|
| SHA3-384 hash: | cdaced02510048ab61fe5412cc598e515880362b9d3cd57c502581c5fc80cd1f917d19a5a88778fe23207c1c79a2c743 |
| SHA1 hash: | c02eea30ec044a3e8f60b84b960ed70bbf7fee2e |
| MD5 hash: | 69f26c9e7dfc93644c1c9ebaeff84128 |
| humanhash: | yellow-mango-edward-hot |
| File name: | file |
| Download: | download sample |
| Signature | Stealc |
| File size: | 221'600 bytes |
| First seen: | 2024-09-09 13:56:56 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 6144:SRVDJEiSbWAUzJYyFhMNFM0ncnWIIHMEO:MJSbWAUzJHFqrM0nMWIpEO |
| Threatray | 11 similar samples on MalwareBazaar |
| TLSH | T18D24126186D00CAAFD6AD177B4C0E717FDB0F3D63D8346D6316684A49B2938017A12FE |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | exe Stealc |
Intelligence
File Origin
# of uploads :
1
# of downloads :
422
Origin country :
USVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2024-09-09 14:00:10 UTC
Tags:
stealer stealc loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
70%
Tags:
Encryption Static
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Launching a process
Creating a file
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Forced shutdown of a system process
Connection attempt to an infection source
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
overlay packed stealc
Verdict:
Malicious
Labled as:
Malware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Stealc
Verdict:
Malicious
Result
Threat name:
LummaC, Stealc, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking locale)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Stealc
Yara detected Vidar
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Score:
48%
Verdict:
Susipicious
File Type:
PE
Threat name:
ByteCode-MSIL.Trojan.Privateloader
Status:
Malicious
First seen:
2024-09-09 13:57:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
19 of 24 (79.17%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 1 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:lumma family:stealc family:vidar botnet:default credential_access discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Downloads MZ/PE file
Credentials from Password Stores: Credentials from Web Browsers
Detect Vidar Stealer
Lumma Stealer, LummaC
Stealc
Vidar
Malware Config
C2 Extraction:
http://46.8.231.109
https://t.me/fneogr
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
https://charistmatwio.shop/api
https://preachstrwnwjw.shop/api
https://complainnykso.shop/api
https://basedsymsotp.shop/api
https://grassemenwji.shop/api
https://ignoracndwko.shop/api
https://stitchmiscpaew.shop/api
https://commisionipwn.shop/api
https://tenntysjuxmz.shop/api
https://t.me/fneogr
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
https://charistmatwio.shop/api
https://preachstrwnwjw.shop/api
https://complainnykso.shop/api
https://basedsymsotp.shop/api
https://grassemenwji.shop/api
https://ignoracndwko.shop/api
https://stitchmiscpaew.shop/api
https://commisionipwn.shop/api
https://tenntysjuxmz.shop/api
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
e0092d9787dcdc6444342b6be1c84fcbcfbff52110577599db455a61f3f981da
MD5 hash:
db0fabbc7f075bc72451ee8335303820
SHA1 hash:
f50039646ac66e3e3e044ab2f8aac65941a2716d
Detections:
stealc
Parent samples :
e80e120da34729c9fb7e7d4a684a7260f1346696ee8b3b514b6e512ebfa1bea4
00c66edc8b41592e299f449a6b7a4e3ab949f7cca0c27bba9a279feacc6e5b6b
daf4e8849a3b6011bff41cc2c7decee8c769a4ebf2be3d7316930f40448ddb25
ec9a1bede697caba74ff4666e0317cb3231fe37fbcb9f8821620c52d7d8a4dad
06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4
c98f17dd444209ad0a6d71221b67cd632bc6409686f750bb5118a7e42eca91e0
d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71
91f03b0ae9dcae932e3043b7cb19cf52541504e9a4510501d9cb2f1ddd6d10f4
2e4deff4bfe5c4ce46b2d0a1f875dbc0933ec2e0f0e4a210990352601c29638e
5afff322d4b56afbe4429c6fd83aa2d699c51dbf4f5495b08ac104f07da8c49d
743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24
32d0ae27d9ae49a224785cd08bae82b0ec4e944145cb2f106873f70fc2908fe7
3f9daff50fd608eb15026903bf89ad2aafae0b344f0fd82e9ea82d4071a781d7
2bac0508680cb0cdf61b10a529c4a97dfc0562fe85b740abfef0ee2ff97a9fc2
d9bb5fc7267c854e20e63ef68546da25e71270c36bcee73e328437c891892945
6d70e80c80af977af8b15cb47304b4cbd78759faa406906ed3a9e0a6dac74773
bf4bd835390e2607c737360a2527ea292bd0451507f93b623d3f9bbf4036c2fe
e48219567f84882f41bb1e957bbd1358e453274ca0d2025505c66779f642bc30
d63d18c67f83e54c77072aa953c5e5c0496a7a4c2ac6ca8bd07e211ee80b3d6c
43e7575547a95e5c4d7b7ad2915c830f252ab206a0baf9691206200a644e7b94
00c66edc8b41592e299f449a6b7a4e3ab949f7cca0c27bba9a279feacc6e5b6b
daf4e8849a3b6011bff41cc2c7decee8c769a4ebf2be3d7316930f40448ddb25
ec9a1bede697caba74ff4666e0317cb3231fe37fbcb9f8821620c52d7d8a4dad
06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4
c98f17dd444209ad0a6d71221b67cd632bc6409686f750bb5118a7e42eca91e0
d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71
91f03b0ae9dcae932e3043b7cb19cf52541504e9a4510501d9cb2f1ddd6d10f4
2e4deff4bfe5c4ce46b2d0a1f875dbc0933ec2e0f0e4a210990352601c29638e
5afff322d4b56afbe4429c6fd83aa2d699c51dbf4f5495b08ac104f07da8c49d
743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24
32d0ae27d9ae49a224785cd08bae82b0ec4e944145cb2f106873f70fc2908fe7
3f9daff50fd608eb15026903bf89ad2aafae0b344f0fd82e9ea82d4071a781d7
2bac0508680cb0cdf61b10a529c4a97dfc0562fe85b740abfef0ee2ff97a9fc2
d9bb5fc7267c854e20e63ef68546da25e71270c36bcee73e328437c891892945
6d70e80c80af977af8b15cb47304b4cbd78759faa406906ed3a9e0a6dac74773
bf4bd835390e2607c737360a2527ea292bd0451507f93b623d3f9bbf4036c2fe
e48219567f84882f41bb1e957bbd1358e453274ca0d2025505c66779f642bc30
d63d18c67f83e54c77072aa953c5e5c0496a7a4c2ac6ca8bd07e211ee80b3d6c
43e7575547a95e5c4d7b7ad2915c830f252ab206a0baf9691206200a644e7b94
SH256 hash:
e80e120da34729c9fb7e7d4a684a7260f1346696ee8b3b514b6e512ebfa1bea4
MD5 hash:
69f26c9e7dfc93644c1c9ebaeff84128
SHA1 hash:
c02eea30ec044a3e8f60b84b960ed70bbf7fee2e
Malware family:
Stealc
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Dropped by
Privateloader
Delivery method
Distributed via web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.