MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fa20b849ebe7c53d59f3ed0fcfac8445ea08e7296af5ada0d3be2aace5d727e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Stealc
Vendor detections: 15
| SHA256 hash: | fa20b849ebe7c53d59f3ed0fcfac8445ea08e7296af5ada0d3be2aace5d727e8 |
|---|---|
| SHA3-384 hash: | d8359f829e09bb0e77640df91dcf6a39b846c715641d26af9ce88f5859dc49d2c484fe94443125d2a06888d63a90daed |
| SHA1 hash: | 21395fc347e167b889818461becca2e242f889af |
| MD5 hash: | 1a1d5627373ecd30414938e941f281b8 |
| humanhash: | three-vegan-sad-black |
| File name: | fa20b849ebe7c53d59f3ed0fcfac8445ea08e7296af5a.exe |
| Download: | download sample |
| Signature | Stealc |
| File size: | 391'680 bytes |
| First seen: | 2024-12-11 08:00:21 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d3615be1139396edbe67ecebf8b56134 (2 x Stealc) |
| ssdeep | 3072:CmFmix9LrJ+unBU9MA1jTwoElX2kWSKV+AA47nlsms4vwV6RWqChEypWHz0C8nWt:BFVLrBBUb17EXK3h9NoOxuMHwOtApO |
| TLSH | T12984012235D0C072C1875530D864DBA1BFBE74315AA58A9B37B80BFD2E707D1977A346 |
| TrID | 38.6% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9) 29.0% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 9.7% (.EXE) Win64 Executable (generic) (10522/11/4) 6.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 0404040218102000 (1 x Stealc) |
| Reporter | |
| Tags: | exe Stealc |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://92.255.57.89/45c616e921a794b8.php | https://threatfox.abuse.ch/ioc/1354319/ |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
41c2c33823d372f8389b978fdaef60eb6d02aea21bf20b1aad7a11bde5f5dca8
84b4eda5d456a2c49d117a0b99bc2ed03044eaa144eb5f6c28a248e673e406db
e41990e00d72a4f9b5331fab7e2c59393333aa30c42bf4ebf80eed1d45bc2e45
1891f566c018182f1b5826b5fe2a05d6927aff15638d28c7cbe77ab11a366e12
3fda9975f9a08ff37ed6dd52d64b7f69e692ee8d1cc132c48b055256efa43779
176ee771c395dc6748a4c973a15d53a5d68b9704989349a862714e4bdc0f9fda
fa20b849ebe7c53d59f3ed0fcfac8445ea08e7296af5ada0d3be2aace5d727e8
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | RansomPyShield_Antiransomware |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::FindNextVolumeMountPointW KERNEL32.dll::GetDevicePowerState KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetVolumeInformationA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleInputA KERNEL32.dll::WriteConsoleA KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleInputW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode KERNEL32.dll::GetConsoleOutputCP |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateFileA KERNEL32.dll::GetFileAttributesW KERNEL32.dll::GetTempFileNameA KERNEL32.dll::BackupWrite |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameA |
| WIN_HTTP_API | Uses HTTP services | WINHTTP.dll::WinHttpCheckPlatform |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.