MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0acd38d5a035fba9c1696ff905efb055c87ed33a185edf7b1a37daabf627f810. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SalatStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 51 File information Comments

SHA256 hash: 0acd38d5a035fba9c1696ff905efb055c87ed33a185edf7b1a37daabf627f810
SHA3-384 hash: 09286c73aef389adfdd14a188837f3923b377d8036b61b365b364ad0d4a15f290180a03ec2f47ad8b67e5f82c6a64e98
SHA1 hash: 60a2d08721ff0b45f683d8061fa535d05b6f180a
MD5 hash: 7ab256fb25941d9c9efb29ea16cc505f
humanhash: victor-delaware-rugby-ink
File name:SWAOutput.exe
Download: download sample
Signature SalatStealer
File size:5'855'744 bytes
First seen:2025-09-12 14:13:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 98304:QtIREwGW1bBxDtROp+UtITyU8Duh5J5+7YB1w92UiE2ltGT2TAnrl:fEwGgbBxTOJ0CYJfsnvOzMnr
TLSH T1434633615163E29AE70A02F1885FC725991CE982E92FCE75EC3BC744F49E085E2FD1D2
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter burger
Tags:exe SalatStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SWAOutput.exe
Verdict:
Malicious activity
Analysis date:
2025-09-12 14:10:01 UTC
Tags:
inno installer delphi stealer ms-smartcard golang upx salatstealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
dropper crypt blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a window
DNS request
Sending a UDP request
Searching for synchronization primitives
Connection attempt
Sending a custom TCP request
Connection attempt to an infection source
Using the Windows Management Instrumentation requests
Creating a file in the Program Files subdirectories
Launching a process
Creating a process with a hidden window
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed vbnet
Verdict:
Malicious
Labled as:
Backdoor.Marte.VenomRAT.Generic
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-12T11:13:00Z UTC
Last seen:
2025-09-12T11:13:00Z UTC
Hits:
~10
Detections:
Trojan-PSW.Win32.Coins.sb Trojan-Banker.Win32.Agent.gen HEUR:Trojan-Spy.MSIL.Stealer.gen HEUR:Trojan.MSIL.Exnet.gen Trojan-Downloader.Win32.Agent.sb PDM:Trojan.Win32.Generic Trojan-PSW.Win64.Salat.sb Trojan-PSW.Win64.Salat.aih VHO:Trojan-PSW.Win64.Salat.aih
Malware family:
ModernLoader
Verdict:
Malicious
Result
Threat name:
Salat Stealer
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
58 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates multiple autostart registry keys
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Salat Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1776512 Sample: SWAOutput.exe Startdate: 12/09/2025 Architecture: WINDOWS Score: 58 73 x1.i.lencr.org 2->73 75 e8652.dscx.akamaiedge.net 2->75 77 7 other IPs or domains 2->77 99 Antivirus detection for URL or domain 2->99 101 Antivirus detection for dropped file 2->101 103 Antivirus / Scanner detection for submitted sample 2->103 105 4 other signatures 2->105 11 SWAOutput.exe 4 2->11         started        14 QyojGWZl6JRsN.exe 16 5 2->14         started        18 HflK68ac1MMlCnsY.exe 2->18         started        20 2 other processes 2->20 signatures3 process4 dnsIp5 59 C:\Users\user\AppData\Local\Temp\swav2.exe, PE32 11->59 dropped 61 C:\Users\user\AppData\...\SWAInstaller.exe, PE32 11->61 dropped 63 C:\Users\user\AppData\...\SWAOutput.exe.log, CSV 11->63 dropped 22 SWAInstaller.exe 2 11->22         started        26 swav2.exe 2 4 11->26         started        93 109.248.231.160, 49733, 55880 EXPERT-ASRU Russian Federation 14->93 95 104.21.112.1, 443, 51795 CLOUDFLARENETUS United States 14->95 97 3 other IPs or domains 14->97 119 Found many strings related to Crypto-Wallets (likely being stolen) 14->119 121 Tries to harvest and steal browser information (history, passwords, etc) 14->121 123 Tries to steal Crypto Currency Wallets 14->123 29 powershell.exe 14->29         started        file6 signatures7 process8 dnsIp9 53 C:\Users\user\AppData\...\SWAInstaller.tmp, PE32 22->53 dropped 107 Multi AV Scanner detection for dropped file 22->107 31 SWAInstaller.tmp 25 26 22->31         started        81 dns.google 8.8.4.4, 443, 51792, 51793 GOOGLEUS United States 26->81 83 8.8.8.8, 443, 53924 GOOGLEUS United States 26->83 85 104.21.16.1, 443, 53926 CLOUDFLARENETUS United States 26->85 55 C:\Program Files (x86)\...\QyojGWZl6JRsN.exe, PE32 26->55 dropped 57 C:\...\HflK68ac1MMlCnsY.exe, PE32 26->57 dropped 109 Antivirus detection for dropped file 26->109 111 Found many strings related to Crypto-Wallets (likely being stolen) 26->111 113 Creates multiple autostart registry keys 26->113 34 HflK68ac1MMlCnsY.exe 26->34         started        115 Loading BitLocker PowerShell Module 29->115 36 conhost.exe 29->36         started        file10 signatures11 process12 file13 65 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 31->65 dropped 67 C:\...\unins000.exe (copy), PE32 31->67 dropped 69 C:\Program Files (x86)\SWA\...\is-FRU60.tmp, PE32 31->69 dropped 71 8 other malicious files 31->71 dropped 38 SWA.exe 15 5 31->38         started        process14 dnsIp15 79 api.swa-recloud.fun 104.21.64.1, 443, 49724 CLOUDFLARENETUS United States 38->79 41 msedgewebview2.exe 38->41         started        process16 signatures17 117 Found strings related to Crypto-Mining 41->117 44 msedgewebview2.exe 41->44         started        47 msedgewebview2.exe 41->47         started        49 msedgewebview2.exe 41->49         started        51 2 other processes 41->51 process18 dnsIp19 87 ln-0007.ln-msedge.net 150.171.22.17, 443, 49725 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 44->87 89 150.171.27.11, 443, 49732 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 44->89 91 2 other IPs or domains 44->91
Gathering data
Threat name:
Win32.Backdoor.MarteVenomRAT
Status:
Malicious
First seen:
2025-09-12 14:12:59 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
28 of 38 (73.68%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
salatstealer unc_loader_063
Similar samples:
Result
Malware family:
n/a
Score:
  7/10
Tags:
credential_access defense_evasion discovery spyware stealer trojan upx
Behaviour
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Network Share Discovery
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Checks computer location settings
Unpacked files
SH256 hash:
0acd38d5a035fba9c1696ff905efb055c87ed33a185edf7b1a37daabf627f810
MD5 hash:
7ab256fb25941d9c9efb29ea16cc505f
SHA1 hash:
60a2d08721ff0b45f683d8061fa535d05b6f180a
SH256 hash:
1758e53aaf7345a9ad0f83904f92fb6e88c64d2acc6a13f8f70061621c8089ee
MD5 hash:
885d328e8defbd5843c40113d1e9b3e4
SHA1 hash:
b7d3b555b915337e1430cd859ab0d9483f46d8a3
Detections:
INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
SH256 hash:
0739d6b3aed9b280db862a9bd66499888139e28fdef89de4620483c74e305741
MD5 hash:
7792a720bd1018526ea74698cabdf813
SHA1 hash:
cfcc3b819be3eb07bbf89bb92b307871c0f50993
SH256 hash:
ad2685da748cfceaf72109d1416ff9e8f06102a7d8afbf9a6ee1726a23745e98
MD5 hash:
151ec4ca4340dc3e69431d3413ef1b1a
SHA1 hash:
e776bb4f91d1d61b4b148ea797380902aaf73b39
SH256 hash:
c3f6766125f9335542f509c2a942d7204d38311ced7bf9951bbbb71c730159d2
MD5 hash:
dbc9b36d3c2edff082dd7d095e2c7521
SHA1 hash:
5a9a3beebd1f54a3a9ad5c4b7d802751494165fa
Detections:
INDICATOR_EXE_Packed_Fody
SH256 hash:
9385c839e8dd0e347840951858ce5ebbd9404265149b9af823280bb71e763dd1
MD5 hash:
c1c49e8baa944098097425ab8f66ffd8
SHA1 hash:
c44e5ab8dee259b3441319eff2e161c6e7ed3907
Malware family:
SalatStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Detect_Go_GOMAXPROCS
Author:Obscurity Labs LLC
Description:Detects Go binaries by the presence of runtime.GOMAXPROCS in the runtime metadata
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:Heuristics_ChromeABE
Author:Still
Description:attempts to match instructions related to Chrome App-bound Encryption elevation service; possibly spotted amongst infostealers
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Multi_Generic_Threat_19854dc2
Author:Elastic Security
Rule name:pe_imphash
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Rooter
Author:Seth Hardy
Description:Rooter
Rule name:RooterStrings
Author:Seth Hardy
Description:Rooter Identifying Strings
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments