MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f10d404c81ab884341c8c2dc49a8b49370bea9dc601ecd0b9f970a6d635e5da1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Stealc


Vendor detections: 18


Intelligence 18 IOCs YARA 7 File information Comments

SHA256 hash: f10d404c81ab884341c8c2dc49a8b49370bea9dc601ecd0b9f970a6d635e5da1
SHA3-384 hash: 332e0ac099e0e2b8296d3a50b3a678c598da01e131bf680df6549b340d2e7644cb1f42759a991f36fcedebf42e183bb0
SHA1 hash: 1dc5beb369f0af15c1fbf792060ae782d5b7c14c
MD5 hash: cb7d153e0b6288be03b05d92c9636b04
humanhash: bakerloo-fruit-alaska-pennsylvania
File name:Tse2E3k.exe
Download: download sample
Signature Stealc
File size:1'228'800 bytes
First seen:2025-08-30 14:52:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 82c087080422decfaeb58e6a93d707b4 (2 x LummaStealer, 1 x Rhadamanthys, 1 x PureLogsStealer)
ssdeep 24576:igHo19TDgiST8sj8PCVLz0iCUIxLtvuwIXmjMRxG:igKkT8o0lWwqmn
Threatray 352 similar samples on MalwareBazaar
TLSH T1E545E035904262DAF1A680B35A455680F563B83747392FEF42F4E7751E0AEE80F3E716
TrID 63.5% (.EXE) Win64 Executable (generic) (10522/11/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe Stealc

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
a29635bd603e1997148880259df5c2a7f2aaf14cd41e44a3bb0624390bf4cc5d.bin.exe
Verdict:
Malicious activity
Analysis date:
2025-08-29 22:37:59 UTC
Tags:
lumma stealer themida auto redline amadey botnet loader telegram gcleaner rdp autoit evasion phishing stealc websocket auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
virus
Result
Verdict:
Clean
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint krypt microsoft_visual_cc obfuscated packed packed packer_detected
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-08-29T10:27:00Z UTC
Last seen:
2025-08-29T10:27:00Z UTC
Hits:
~100
Detections:
Trojan-PSW.Lumma.HTTP.C&C PDM:Trojan.Win32.Generic Trojan-PSW.Win32.Lumma.vgp
Result
Threat name:
Stealc v2, Xmrig
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
DNS related to crypt mining pools
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Stop EventLog
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Yara detected Stealc v2
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1768171 Sample: Tse2E3k.exe Startdate: 30/08/2025 Architecture: WINDOWS Score: 100 92 xmr-eu1.nanopool.org 2->92 94 trainisshit.shop 2->94 96 2 other IPs or domains 2->96 104 Found malware configuration 2->104 106 Malicious sample detected (through community Yara rule) 2->106 108 Antivirus detection for dropped file 2->108 112 13 other signatures 2->112 10 Tse2E3k.exe 2->10         started        13 updater.exe 2->13         started        16 svchost.exe 2->16         started        18 3 other processes 2->18 signatures3 110 DNS related to crypt mining pools 92->110 process4 file5 140 Writes to foreign memory regions 10->140 142 Allocates memory in foreign processes 10->142 144 Injects a PE file into a foreign processes 10->144 146 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 10->146 20 MSBuild.exe 23 10->20         started        25 conhost.exe 10->25         started        90 C:\Windows\Temp\fwvisgtkabvd.sys, PE32+ 13->90 dropped 148 Antivirus detection for dropped file 13->148 150 Multi AV Scanner detection for dropped file 13->150 152 Query firmware table information (likely to detect VMs) 13->152 156 11 other signatures 13->156 27 explorer.exe 13->27         started        29 powershell.exe 13->29         started        31 cmd.exe 13->31         started        35 10 other processes 13->35 154 Changes security center settings (notifications, updates, antivirus, firewall) 16->154 33 MpCmdRun.exe 1 16->33         started        signatures6 process7 dnsIp8 98 trainisshit.shop 87.120.126.216, 49687, 49692, 80 UNACS-AS-BG8000BurgasBG Bulgaria 20->98 100 lomejordesalamanca.es 188.164.198.15, 49693, 80 INFORTELECOM-ASES Spain 20->100 82 C:\Users\user\AppData\...\n8eNhBKZKFUB.exe, PE32+ 20->82 dropped 84 C:\Users\user\AppData\...\chrome_134[1].exe, PE32+ 20->84 dropped 114 Found many strings related to Crypto-Wallets (likely being stolen) 20->114 116 Tries to harvest and steal browser information (history, passwords, etc) 20->116 118 Writes to foreign memory regions 20->118 128 5 other signatures 20->128 37 n8eNhBKZKFUB.exe 1 3 20->37         started        41 conhost.exe 20->41         started        43 chrome.exe 20->43         started        53 2 other processes 20->53 102 54.37.137.114, 10343, 49694 OVHFR France 27->102 120 System process connects to network (likely due to code injection or exploit) 27->120 122 Query firmware table information (likely to detect VMs) 27->122 124 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 27->124 126 Loading BitLocker PowerShell Module 29->126 45 conhost.exe 29->45         started        47 conhost.exe 31->47         started        49 wusa.exe 31->49         started        51 conhost.exe 33->51         started        55 9 other processes 35->55 file9 signatures10 process11 file12 86 C:\ProgramDatabehaviorgraphoogle\Chrome\updater.exe, PE32+ 37->86 dropped 88 C:\Windows\System32\drivers\etc\hosts, ASCII 37->88 dropped 130 Antivirus detection for dropped file 37->130 132 Multi AV Scanner detection for dropped file 37->132 134 Query firmware table information (likely to detect VMs) 37->134 136 8 other signatures 37->136 57 powershell.exe 23 37->57         started        60 cmd.exe 1 37->60         started        62 powercfg.exe 1 37->62         started        64 12 other processes 37->64 signatures13 process14 signatures15 138 Loading BitLocker PowerShell Module 57->138 66 conhost.exe 57->66         started        68 conhost.exe 60->68         started        70 wusa.exe 60->70         started        72 conhost.exe 62->72         started        74 conhost.exe 64->74         started        76 conhost.exe 64->76         started        78 conhost.exe 64->78         started        80 8 other processes 64->80 process16
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Amadey
Status:
Malicious
First seen:
2025-08-29 15:34:34 UTC
File Type:
PE+ (Exe)
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:stealc botnet:logsdillercloud discovery stealer
Behaviour
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Stealc
Stealc family
Malware Config
C2 Extraction:
http://trainisshit.shop
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f10d404c81ab884341c8c2dc49a8b49370bea9dc601ecd0b9f970a6d635e5da1
MD5 hash:
cb7d153e0b6288be03b05d92c9636b04
SHA1 hash:
1dc5beb369f0af15c1fbf792060ae782d5b7c14c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Debugger
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Stealc

Executable exe f10d404c81ab884341c8c2dc49a8b49370bea9dc601ecd0b9f970a6d635e5da1

(this sample)

  
Delivery method
Distributed via web download

Comments