| File name: | file |
| Full analysis: | https://app.any.run/tasks/9291418b-25f7-4463-b6f9-971fcadc6570 |
| Verdict: | Malicious activity |
| Threats: | Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests. |
| Analysis date: | October 07, 2023, 02:23:41 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | B8C27F896C4241196C357B8AAD465EA5 |
| SHA1: | 245ECB42A5834D2271D40832D911228E8D9DB132 |
| SHA256: | 545DFA973A3C7308627B21D1C230D58323BF08FDF8E0A31FDF4EFAEFD5F2FA12 |
| SSDEEP: | 49152:eLnemIiqMiEMvtHmfNQ9hVTOY3VOiRjrrywta7k11ia6w6BWziTQlpgCvFB999sL:Cn2cAtHmfNQ9hVTrFB/ywtsev8BWziTh |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:05:25 00:49:06+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.13 |
| CodeSize: | 25600 |
| InitializedDataSize: | 1137664 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6a60 |
| OSVersion: | 10 |
| ImageVersion: | 10 |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 11.0.17763.1 |
| ProductVersionNumber: | 11.0.17763.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Win32 Cabinet Self-Extractor |
| FileVersion: | 11.00.17763.1 (WinBuild.160101.0800) |
| InternalName: | Wextract |
| LegalCopyright: | © Microsoft Corporation. All rights reserved. |
| OriginalFileName: | WEXTRACT.EXE .MUI |
| ProductName: | Internet Explorer |
| ProductVersion: | 11.00.17763.1 |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 416 | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\2GF7617.exe | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\2GF7617.exe | Vk7ut40.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 Stealc(PID) Process(416) 2GF7617.exe C2http://5.42.92.211/ Strings (158)#" x32 x64 %ix%i %ls %ls/%ls %ls\%ls %ls\%ls\Local State %ls\* %ls\History %ls\Local Extension Settings\%ls %ls\Login Data %ls\Web Data %ls\cookies.sqlite %ls\formhistory.sqlite %ls\places.sqlite %s%s %s/%s --%sContent-Disposition: form-data; name="%s" ..\stealer\chromiumbrowsers.cpp ..\stealer\filesgrabber.cpp ..\stealer\httpclient.cpp ..\stealer\loader.cpp ..\stealer\sqlite3.cpp ..\stealer\stealer.cpp .dll .exe 9375CFF0413111d3B88A00104B2A6676 ============= =============== Ablmhkr(elXel'mqm Advapi32.dll Autofills/%ls_%ls.txt Available KeyboardLayouts: Build mark: Chromium browsers paths were retrieved ComSpec Command line: %ls Config retrieved: %d, %d, %d, %d, %d, %d, %d, %d, %d, %d Content-Type: multipart/form-data; boundary=%sContent-Length: %d Cookies Cookies/%ls_%ls.txt CreditCards/%ls_%ls.txt Current language: DISPLAY Default Email Email/Credentials.txt Email: EnterCritic6lSection Expand path: %ls Extensions were retrieved Failed to connect to %s Failed to download sqlite3.dll Failed to export functions from sqlite3.dll Failed to retrieve chromium browsers paths Failed to retrieve files grabber paths Files grabber paths were retrieved FilesGrabber: Sent %ls Find chromium cookies db %ls Find chromium extension %ls with id %ls Find chromium history db %ls Find chromium login data db %ls Find chromium web data db %ls Find gecko autofills db %ls Find gecko cookies db %ls Find gecko file %ls Find gecko history db %ls Find steam data, path %ls GPU: Gdi32.dll Gecko/%ls/%ls/%ls Gonna gather system information Gonna grab ChromiumBrowsers Gonna grab files Gonna grab steam Gonna take screenshot GrabFiles HandleChromiumBrowsers Hardwares: CPU: History/%ls_%ls.txt Holder: Host: HttpQueryInfo fails; last error: %x IMAP Password IP: {ip}File Location: Init InitializeCriticalSection Kernel32.dll Key: LeaveCriticalSectin LoadLibraryA Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1) Name: Network\Cookies Ntdll.dll Ole32.dll Operation System: POST Passwords.txt ProductName QBJM RAM: %ull Request Retrieve rule FilesGrabber, server side path: %ls Rstrtmgr.dll SELECT fieldname, value FROM moz_formhistory SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies SELECT name, value FROM autofill SELECT origin_url, username_value, password_value FROM logins SELECT title, url FROM moz_places SELECT url, title FROM urls ScreenSize: Screenshot.jpeg Sent log. Gonna send done message Sent system information SrartLoader Start Steam/%ls SteamPath Successfully connected to %s Successfully start process TRUE Telegram/%ls There's file to load. Gonna load it Title: Token retrieved: %s Trying to connect to %s User32.dll UserName: Wallets/%ls_%ls_%ls Wininet.dll Write file content in %ls abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 build computername encrypted_key file filename hwid image/jpeg kernel32.dll key3.db key4.db loader log9ns.json loghub/master msg sqlite3 sqlite3_close{f sqlite3_column_blob sqlite3_column_bytes sqlite3_column_text sqlite3_open sqlite3_open_v2 sqlite3_prepare_v2 sqlite3_step token | ||||
| 460 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\qA1pq51.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\qA1pq51.exe | — | file.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) | ||||
| 2688 | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\xP7iJ64.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\xP7iJ64.exe | — | qA1pq51.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) | ||||
| 2728 | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\1Nj33Fh2.exe | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\1Nj33Fh2.exe | — | Vk7ut40.exe |
User: admin Integrity Level: MEDIUM Description: Healer Exit code: 0 Version: 1.0.0.0 | ||||
| 2964 | "C:\Users\admin\AppData\Local\Temp\file.exe" | C:\Users\admin\AppData\Local\Temp\file.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) | ||||
| 2972 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | 2GF7617.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET ClickOnce Launch Utility Exit code: 1 Version: 4.7.2558.0 built by: NET471REL1 | ||||
| 3052 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\Vk7ut40.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\Vk7ut40.exe | — | xP7iJ64.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) | ||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2964 | file.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\5CW9Ll9.exe | executable | |
MD5:EC861951D3EA867605AFAEC4B868D911 | SHA256:38C9BFF92645DF776DE8F959348E85C6B0325AF36C4BD4C8B5B01E99346697CA | |||
| 2688 | xP7iJ64.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\Vk7ut40.exe | executable | |
MD5:EDEBA4EC99FDE7061A3C3022538D27A8 | SHA256:D7133C202FE9BD99340BD91F225D24450216820A69BE59DBF2E137B45FF78DBE | |||
| 460 | qA1pq51.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\4GJ045mb.exe | executable | |
MD5:A38CE3E2DC246D8E40F95186737C588F | SHA256:C42EFCD5F53C75F36A6ED5C8F8BE82359B848285FFB0FC5ACC12FBD625C7028E | |||
| 2688 | xP7iJ64.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\3wx83AB.exe | executable | |
MD5:F09B788BFB242F8EDCB4B4AB2BD0275A | SHA256:F291D8694F3198B824474D57A18792218A5D622F2F59370EFE6679563DB87521 | |||
| 2964 | file.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\qA1pq51.exe | executable | |
MD5:C6936AE9C85F345AFDEA3E4DDABA3086 | SHA256:B9372FDE0FEF14ACEC185A83C944C46C9CCAEFA2CCF8A61F4369FA593E460CFF | |||
| 460 | qA1pq51.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\xP7iJ64.exe | executable | |
MD5:12A376D4EDFBF0143D2313962FF10433 | SHA256:C47E82546C9F8CBA335722B257F801C1D4F4232D1D02BE45BDB9738912D1CFBE | |||
| 3052 | Vk7ut40.exe | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\1Nj33Fh2.exe | executable | |
MD5:8904F85ABD522C7D0CB5789D9583CCFF | SHA256:7624B62FE97C8E370C82BC86F69C2F627328E701CE1F3D9BED92A1E5FE11FD7F | |||
| 2972 | AppLaunch.exe | C:\Users\admin\AppData\Local\Temp\4375vtb45tv8225nv4285n2.txt | text | |
MD5:E563079567A0C446790637EE26CFA4CE | SHA256:99F4379E25640E94EB4B757C441BE7AA591DC056A1CB488E5B8A5CFA5D4201C1 | |||
| 3052 | Vk7ut40.exe | C:\Users\admin\AppData\Local\Temp\IXP003.TMP\2GF7617.exe | executable | |
MD5:F0831F173733DE08511F3A0739F278A6 | SHA256:8B00F9DCE8CEB2123FBA3BC9F88419960D1E661B6287EAFEBA4F0A2EE4BE3D27 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2972 | AppLaunch.exe | POST | 200 | 5.42.92.211:80 | http://5.42.92.211/loghub/master | unknown | text | 8 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
2972 | AppLaunch.exe | 5.42.92.211:80 | — | CJSC Kolomna-Sviaz TV | RU | unknown |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
PID | Process | Class | Message |
|---|---|---|---|
2972 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST) |
2972 | AppLaunch.exe | A Network Trojan was detected | STEALER [ANY.RUN] Win32/Stealc (Check-In) |
2972 | AppLaunch.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
Process | Message |
|---|---|
AppLaunch.exe | 2023-10-07 02:24:06 [AppLaunch.exe 2972] Trying to connect to http://5.42.92.211/
|
AppLaunch.exe | 2023-10-07 02:24:07 [AppLaunch.exe 2972] ERROR in ..\stealer\stealer.cpp, line 156, function Start. Failed to connect to http://5.42.92.211/
|