MalwareBazaar Database

This page shows some basic information the YARA rule infostealer_win_acrstealer_str including corresponding malware samples.

Database Entry


YARA Rule:infostealer_win_acrstealer_str
Description:Finds ACR Stealer standalone samples based on specific strings.
Firstseen:2024-06-01 12:46:28 UTC
Lastseen:2025-02-08 07:13:28 UTC
Sightings:9

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter