Compare static attributes between the target file and 5 similar samples from our threat intelligence database.
| Attribute |
Target
Baseline
MALICIOUS* 100.0%
N/A
|
Sample #1
90.3%
MALICIOUS
Stealc
|
Sample #2
88.0%
MALICIOUS
Stealc
|
Sample #3
85.9%
MALICIOUS
Stealc
|
Sample #4
81.3%
MALICIOUS
Amadey
|
Sample #5
80.0%
MALICIOUS
Stealc
|
||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| compilation_datetime | 2025-10-12 | 2025-09-16 | 2025-10-12 | 2025-09-16 | 2023-11-04 | 2025-09-16 | ||||||||||||
| data_directories.present | IMPORT_TABLE, RESOURCE_TABLE, EXCEPTION_TABLE, ... (6 total) | IMPORT_TABLE, RESOURCE_TABLE, EXCEPTION_TABLE, ... (6 total) | IMPORT_TABLE, RESOURCE_TABLE, EXCEPTION_TABLE, ... (6 total) | IMPORT_TABLE, RESOURCE_TABLE, EXCEPTION_TABLE, ... (6 total) | IMPORT_TABLE, RESOURCE_TABLE, CERTIFICATE_TABLE, ... (5 total) | IMPORT_TABLE, RESOURCE_TABLE, EXCEPTION_TABLE, ... (6 total) | ||||||||||||
|
||||||||||||||||||
| debug.entries_count | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||
| delay_imports.dll_count | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||
| delay_imports.total_functions | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||
| dll_characteristics.HIGH_ENTROPY_VA | Yes | Yes | Yes | Yes | N/A | Yes | ||||||||||||
| dll_characteristics.TERMINAL_SERVER_AWARE | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||||||
| entry_point | 6365272 | 4919384 | 4919384 | 5328984 | 5005216 | 5124184 | ||||||||||||
| exports | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||||||
| file_size | 3624384 | 2900560 | 2862160 | 3378256 | 3147408 | 3007056 | ||||||||||||
| image_size | 9437184 | 7294976 | 7254016 | 8183808 | 7815168 | 7606272 | ||||||||||||
| imports | [Array: 1 items] | [Array: 1 items] | [Array: 1 items] | [Array: 1 items] | [Array: 5 items] | [Array: 1 items] | ||||||||||||
|
||||||||||||||||||
| is_dll | No | No | No | No | No | No | ||||||||||||
| linker_version | 14.43 | 14.43 | 14.43 | 14.43 | 14.24 | 14.43 | ||||||||||||
| load_configuration.present | No | No | No | No | No | No | ||||||||||||
| machine | AMD64 | AMD64 | AMD64 | AMD64 | I386 | AMD64 | ||||||||||||
| relocations.by_type.ABS | 1 | 1 | 1 | 1 | 1 | 1 | ||||||||||||
| relocations.by_type.DIR64 | 3 | 3 | 3 | 3 | N/A | 3 | ||||||||||||
| relocations.total_blocks | 1 | 1 | 1 | 1 | 1 | 1 | ||||||||||||
| relocations.total_entries | 4 | 4 | 4 | 4 | 4 | 4 | ||||||||||||
| resources.has_manifest | Yes | No | Yes | No | Yes | No | ||||||||||||
| resources.has_version_info | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||||||
| resources.number_of_dialogs | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||
| resources.number_of_icons | 9 | 9 | 9 | 9 | 5 | 9 | ||||||||||||
| resources.number_of_string_tables | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||
| rich_header_present | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||||||
| sections | , , , ... (11 total) | , , , ... (11 total) | , , , ... (11 total) | , , , ... (11 total) | , , , ... (11 total) | , , , ... (11 total) | ||||||||||||
|
||||||||||||||||||
| signature.number_of_signatures | 1 | 1 | 1 | 1 | 1 | 1 | ||||||||||||
| signature.signed | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||||||
| signature.signers | C=US, O=DigiCert\... | C=US, ST=Washingt... | C=US, ST=Washingt... | C=US, ST=Washingt... | CN=Hewlett-Packar... | C=US, ST=Washingt... | ||||||||||||
|
||||||||||||||||||
| subsystem | WINDOWS_GUI | WINDOWS_GUI | WINDOWS_GUI | WINDOWS_GUI | WINDOWS_GUI | WINDOWS_GUI | ||||||||||||
| symbols.total_count | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||
| tls.callbacks_count | 0 | 0 | 0 | 0 | 0 | 0 | ||||||||||||
| tls.present | Yes | Yes | Yes | Yes | Yes | Yes | ||||||||||||
| version_info.file_type | APP | APP | APP | APP | APP | APP | ||||||||||||
| version_info.file_version | 1.0.46.420 | 14.2.2.0 | 5.3.14.506 | 5.13.1.221 | 3.52.1.6833 | 5.13.1.221 | ||||||||||||
| version_info.product_version | 1.0.46.420 | 14.2.2.0 | 5.3.14.506 | 5.13.1.221 | 3.52.1.6833 | 5.13.1.221 | ||||||||||||
| version_info.strings.CompanyName | Simutronics Corporation | OGRE Team | Summit Tech | Crytek GmbH | A2SOFTIN Ltd. | Crytek GmbH | ||||||||||||
| version_info.strings.FileDescription | Titan Solution Platform | Object-Oriented Graphics Rendering Engine | Elite Development Environment | CryEngine 5 Runtime | B052 Configuration Utility | CryEngine 5 Runtime | ||||||||||||
| version_info.strings.FileVersion | 1.0.46 | 14.2.2 | 5.3.14 | 5.13.1 | 3.52.1.6833 | 5.13.1 | ||||||||||||
| version_info.strings.InternalName | nebulaplatform | ogre3d | summitengine | cryengine | B052Configurator | cryengine | ||||||||||||
| version_info.strings.LegalCopyright | © 2020 Simutronics Corporation. | © 2000-2025 The OGRE Team | © 2002 Summit Tech. | © 2001-2025 Crytek GmbH. All rights reserved. | Copyright (C) 2013-2019 A2SOFTIN Ltd. | © 2001-2025 Crytek GmbH. All rights reserved. | ||||||||||||
| version_info.strings.OriginalFilename | fusionengine.exe | ogre3d.exe | vanguardplatform.exe | cryengine.exe | B052Configurator.exe | cryengine.exe | ||||||||||||
| version_info.strings.ProductName | Nebula Platform | OGRE3D | VisionForge | CryEngine | U-Prox IP | CryEngine | ||||||||||||
| version_info.strings.ProductVersion | 1.0.46 | 14.2.2 | 5.3.14 | 5.13.1 | 3.52.1.6833 | 5.13.1 | ||||||||||||
The detection assessment for this file is MALICIOUS with 100.0% certainty. Analysis reveals significant structural similarities to the Stealc malware family, indicating a likely genetic relationship and a high probability of this sample also belonging to or being derived from the Stealc lineage.
The target sample exhibits numerous structural indicators consistent with sophisticated malware. Notably, the presence of a TLS callback and the HIGH_ENTROPY_VA and TERMINAL_SERVER_AWARE characteristics in its DLL characteristics suggest advanced evasion and operational design. The file's compilation date and the specific sections present, including .rsrc, .idata, .tls, .themida, .boot, and .reloc, align with patterns observed in custom-developed or heavily obfuscated binaries. The presence of version information attributing the file to "Simutronics Corporation" with a description of "Titan Solution Platform" and internal name "nebulaplatform" suggests a potential attempt to masquerade as legitimate software.
The analysis of similar samples from our intelligence database reveals a strong genetic link to the Stealc malware family. Four out of the five most similar samples (90.3% similarity to reference #1) are classified as Stealc. These shared structural patterns, such as the specific data directories present, the arrangement of sections, and the typical use of kernel32.dll imports with a single function, strongly suggest a common development origin or shared codebase evolution. The divergence in compilation dates and minor variations in version information strings across these similar Stealc samples point towards ongoing development and potential polymorphism within the family.
Furthermore, the presence of one sample classified as Amadey (81.3% similarity to reference #4) in proximity to the Stealc samples is noteworthy. While the structural similarity is lower, the Amadey sample shares some architectural choices, such as the presence of a TLS callback and similar section structures. This suggests a potential, albeit indirect, relationship or the utilization of overlapping tooling or techniques between Stealc and Amadey operations, possibly indicating Amadey's role as a dropper or facilitator for Stealc payloads.
The structural analysis strongly suggests that this sample is a variant of the Stealc malware family, with a geometric similarity of up to 90.3% to known Stealc samples. Stealc is a sophisticated information stealer known for its ability to exfiltrate credentials from various applications, including web browsers, cryptocurrency wallets, and FTP clients. It often employs obfuscation techniques and packing to evade detection. Its typical objectives revolve around financial gain through credential theft and espionage.
The presence of a single Amadey sample (81.3% similarity) in the proximity of Stealc samples warrants further attention. Amadey is a well-documented malware loader and downloader often used to deliver secondary payloads, including stealer malware. The association suggests that Stealc may be distributed or deployed via Amadey campaigns. This cross-family attribution indicates a layered attack infrastructure, where Amadey acts as the initial point of compromise or delivery mechanism, followed by the execution of Stealc to achieve its data exfiltration objectives.
The convergence of structural patterns across multiple Stealc variants, compiled at different times and exhibiting slightly varied legitimate-sounding version information, highlights the dynamic nature of this threat. The reuse of common structural elements and potentially shared codebases across these samples underscores the importance of recognizing the genetic lineage of Stealc, even when presented with polymorphic variations or attempts at masquerading.
Based on the high certainty of this sample being a Stealc variant, potentially delivered by Amadey, immediate response actions should focus on identifying and removing both types of malware. Prioritize endpoint detection and response (EDR) solutions capable of identifying process injection and unusual network communications, as Stealc is known to exhibit such behaviors. Implement network-level blocking for known Amadey and Stealc command-and-control infrastructure. Conduct a comprehensive scan of the environment using signatures and behavioral detection rules targeting Stealc's credential harvesting capabilities and Amadey's known distribution vectors. Advise users to reset credentials for critical applications and services compromised by Stealc. Monitor for the presence of suspicious executables in temporary directories or uncommon startup locations, as Amadey often drops payloads there.