MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad82b7225ce45378784a9e04a9021fd62bb5b1e5245ca76e8dd08317668824bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GenesisStealer


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: ad82b7225ce45378784a9e04a9021fd62bb5b1e5245ca76e8dd08317668824bd
SHA3-384 hash: d5fcc2f422fcb174eb33481fc21b6f36f10c1036dfa0ce1b250d85991026362956343a34b419f24235230a1b3881da5a
SHA1 hash: 589f0ea4cd0da13ab883aec4d6348587ad675575
MD5 hash: dfe97b915a3040131d4f106dba960733
humanhash: cold-skylark-lithium-sad
File name:ArenaWars 2.1.1.msi
Download: download sample
Signature GenesisStealer
File size:99'213'312 bytes
First seen:2025-11-13 10:56:03 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 1572864:/yNQmqknCnS5ggCDi2n3Qvsdq/VDY5+wUAx44Nkjy7UKRS2S/QWzXDDdDiYb:VknCgBCDCrWEgUwUKRSHHdDiY
Threatray 87 similar samples on MalwareBazaar
TLSH T14E28338F4654365ED1A874FEB53AAEEC840F1D66E46734233C54B44A69BA37C3B9320C
TrID 80.0% (.MSI) Microsoft Windows Installer (454500/1/170)
10.7% (.MST) Windows SDK Setup Transform script (61000/1/5)
7.8% (.MSP) Windows Installer Patch (44509/10/5)
1.4% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter burger
Tags:GenesisStealer msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
48
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug crypto fingerprint installer installer wix
Verdict:
Malicious
File Type:
msi
First seen:
2025-11-11T11:41:00Z UTC
Last seen:
2025-11-11T12:01:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-PSW.Script.Generic
Result
Threat name:
Genesis Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Attempt to bypass Chrome Application-Bound Encryption
Detected Genesis Stealer
Drops large PE files
Excessive usage of taskkill to terminate processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Queries sensitive system registry key value via command line tool
Sigma detected: Capture Wi-Fi password
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Unusual module load detection (module proxying)
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1813237 Sample: ArenaWars 2.1.1.msi Startdate: 13/11/2025 Architecture: WINDOWS Score: 100 62 uploads.227efc002310e6abf829b4c6a393bd4a.r2.cloudflarestorage.com 2->62 64 tmpfiles.org 2->64 66 3 other IPs or domains 2->66 90 Sigma detected: Capture Wi-Fi password 2->90 92 Sigma detected: Invoke-Obfuscation CLIP+ Launcher 2->92 94 Joe Sandbox ML detected suspicious sample 2->94 96 2 other signatures 2->96 9 msiexec.exe 249 234 2->9         started        12 msiexec.exe 14 2->12         started        signatures3 process4 file5 54 C:\Users\user\AppData\Local\...\ArenaWars.exe, PE32+ 9->54 dropped 56 C:\Users\user\AppData\Local\...\vulkan-1.dll, PE32+ 9->56 dropped 58 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32+ 9->58 dropped 60 8 other files (none is malicious) 9->60 dropped 15 ArenaWars.exe 22 9->15         started        118 Drops large PE files 12->118 signatures6 process7 dnsIp8 76 ip-api.com 208.95.112.1, 49721, 80 TUT-ASUS United States 15->76 78 api.gofile.io 160.202.167.55, 443, 49742 DEDICATEDUS New Zealand 15->78 80 4 other IPs or domains 15->80 50 C:\Users\...behaviorgraphenesis_System_1763031591480.zip, Zip 15->50 dropped 52 C:\Users\user\AppData\Local\...\passwords.db, SQLite 15->52 dropped 82 Detected Genesis Stealer 15->82 84 Attempt to bypass Chrome Application-Bound Encryption 15->84 86 Suspicious powershell command line found 15->86 88 3 other signatures 15->88 20 cmd.exe 1 15->20         started        23 powershell.exe 15->23         started        25 cmd.exe 15->25         started        27 90 other processes 15->27 file9 signatures10 process11 dnsIp12 98 Uses cmd line tools excessively to alter registry or file data 20->98 100 Uses netsh to modify the Windows network and firewall settings 20->100 102 Tries to harvest and steal WLAN passwords 20->102 30 conhost.exe 20->30         started        32 chcp.com 1 20->32         started        104 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 23->104 106 Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes) 23->106 108 Queries memory information (via WMI often done to detect virtual machines) 23->108 34 conhost.exe 23->34         started        110 Queries sensitive system registry key value via command line tool 25->110 36 conhost.exe 25->36         started        38 reg.exe 25->38         started        68 chrome.cloudflare-dns.com 162.159.61.3, 443, 49723, 57429 CLOUDFLARENETUS United States 27->68 112 Excessive usage of taskkill to terminate processes 27->112 114 Loading BitLocker PowerShell Module 27->114 40 powershell.exe 27->40         started        43 chrome.exe 27->43         started        46 taskkill.exe 1 27->46         started        48 119 other processes 27->48 signatures13 process14 dnsIp15 116 Loading BitLocker PowerShell Module 40->116 70 mail.google.com 142.250.81.229, 443, 49726 GOOGLEUS United States 43->70 72 tools.l.google.com 43->72 74 tools.google.com 43->74 signatures16
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
credential_access defense_evasion discovery execution persistence privilege_escalation ransomware spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Browser Information Discovery
Event Triggered Execution: Netsh Helper DLL
Reads user/profile data of web browsers
System Network Configuration Discovery: Wi-Fi Discovery
Drops file in Windows directory
Executes dropped EXE
Hide Artifacts: Ignore Process Interrupts
Loads dropped DLL
Checks computer location settings
Enumerates processes with tasklist
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Uses browser remote debugging
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments