MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f8d3bcd5cffb3aeb677c57c43240368c39886d19a2b6180cfe9f4cd0ad960b90. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 14
| SHA256 hash: | f8d3bcd5cffb3aeb677c57c43240368c39886d19a2b6180cfe9f4cd0ad960b90 |
|---|---|
| SHA3-384 hash: | 2e408ddedc050d8ea1079ebf717f29364a5a89a5254c33df799497b57b2c130fd707da0037230338958f14658d2ce3ac |
| SHA1 hash: | 592732746456fe9a0b6bceb408848cc598001617 |
| MD5 hash: | 14b157cd17919b72329ce956ffe3ec78 |
| humanhash: | oregon-equal-sierra-high |
| File name: | file |
| Download: | download sample |
| Signature | Stealc |
| File size: | 213'504 bytes |
| First seen: | 2023-09-20 16:08:30 UTC |
| Last seen: | 2023-09-21 12:10:46 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f441e1f89e815eda74d641cd1f758949 (2 x RedLineStealer, 1 x Stealc, 1 x Backdoor.TeamViewer) |
| ssdeep | 3072:DX23B2yaYWSBD9DMrQxiUfDp16g4L3M5J7+qTf+bif3:7iYqWSBDVCqDruE7+qT/ |
| Threatray | 406 similar samples on MalwareBazaar |
| TLSH | T12224DF1135E2C0B2C5B745347870CBA0AABB7C739774894B37642BBEAD307915E66327 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0408021810602000 (1 x Stealc) |
| Reporter | |
| Tags: | exe Stealc |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
b895d8570547395831cd65fc56546c0949405581b861c4354c77b82ac990233f
7ead8e741e86da1488da1bc6793807380c26a09518a7532ea1247d4a69e82070
106318f8a5c025270e181cf5ca8f39cf6644086b5ff763467ecd318a8fe211af
046c29b9d4f755cfe374d52418917670c2a076f475269563e7bc69bc4a2a7c96
57c66ca175ccbbd096a82295fa374327b90b7eabebf7c95752d856da92e4a8b7
e1a208a637e5c3f90a1dfe4a15407fb9dd2992a1e45e4160671f2575f3507d39
f53a80d4acd2ade409cac006689dbf86381154579b66705ed237e79613b99f9f
5a1769f623c6ee8b7b7c488ab030752a1234070b0cc2463540de93e9c40eab33
a8f129e213ff60a297ab08e090082a217bbf8a7a0722837d24d8e677e89608c2
da1a209778c07fc37e32841c3b692f446f11181eb76d788f046a4861142086da
1593dc6a32a51ecdb1ace6ce4b4b69e5c102710b802a4c4bee016d3f20635801
a20c54c6dcdf4873685aa12c7810150e190288a99cd363fac321bc49445ff168
be5b835367689df1b7766dea5c2e06c74217b756b350663fb85a48fb998ccc3c
c81fa46b63a77fcabb07e917378f7df25757a771ff3d4d3c2f789d17107836b1
f8d3bcd5cffb3aeb677c57c43240368c39886d19a2b6180cfe9f4cd0ad960b90
6a69d7c2ecf2222ab7f323e08215f324862cf334baf540b8dd52aa031c9cd941
ef3cb6c23d924b3f5d2334948173b46b5ead364d479a934bdcfed9b8f31d8d1a
a67779827175ff427b36cb7300ce48e10a8d714ce3c75e2d2cc2ad69503b7218
f5748244010e9e8c2cf4da8d7916c12b1bc808003d7f9e46da0e2adc85edf90a
945aeed364ed99757a00efd1873e8a1a86361e5cbb500e0590e64ce87619d594
05279302bbe02f362b1ae6fedd0801852cfc6a2cdaf0d79b67332dae99665d1e
4696940104e0afb7e75830241457db1b6f2c9e54b498afb2d3c5f3b0eb0d564b
5194a7881fb7664475387ffa968f52111ff04bec1c9c4c4a3ff3c37a86b0fcc4
063930ca4af89dcbaa0cd81d3c7a909358ca52842d421df5c73cc49fb8e6c5e1
182e4ae0f954779178c609f70c940202bdfadf24417e30f452a6e6b2ef808af7
6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521
f68b8167482d208f65eb3234f3a3e2602cb4801104946061b0be0f3b440e3c5c
7c59665549676d552743527a5a96383abe8605c1e7bb2556ca32013ba9206c16
7ea53efe7909227d8d1c3b96df3f2194947459d09d6168e629dd1d089b3a9c42
2e6a082a870132c3c47e698398dd6fd3d7941d13737f00af1f70b730ef50ad2a
cc51fcc9c41ebae65c0bdcd5e0b0c8558f395c02f43fb848eaa794b246dab004
2970f93fdff86b1cfdce4bee35650f58bb2c8face78c7e9228ad6c697d3d5b40
ad3d0baaaf1aecbff668d96f6b33d13547cdce3f3ac67e438fd91966194128e7
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.