MalwareBazaar Database

This page shows some basic information the YARA rule win_dotnet_vb_stealer_rat including corresponding malware samples.

Database Entry


YARA Rule:win_dotnet_vb_stealer_rat
Author:Arrbat
Description:Detects .NET/VB executables with stealer/RAT capabilities (sockets, HTTP, processes, registry, etc).
Firstseen:2026-05-04 01:32:22 UTC
Lastseen:2026-05-06 12:02:54 UTC
Sightings:8

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter