MalwareBazaar Database

This page shows some basic information the YARA rule Heuristics_ChromeCookieMonster including corresponding malware samples.

Database Entry


YARA Rule:Heuristics_ChromeCookieMonster
Author:Still
Description:attempts to match strings related to Chromium's CookieMonster; typically used in Chromium secrets scanning by stealers; heuristics rule - may match false positives
Firstseen:2024-10-07 18:33:39 UTC
Lastseen:2025-11-12 12:22:09 UTC
Sightings:16

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter