MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d5b21c50ace8394dd64e9be86a4187362e6fe07af4be39ea5ed8c1d6fe937d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



WallStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: 0d5b21c50ace8394dd64e9be86a4187362e6fe07af4be39ea5ed8c1d6fe937d0
SHA3-384 hash: 914714aa11c00a921c31764f566d5ec765f7a246342557b52e929e7a1cc98e72e909d9b20b4ce06e3d073ed136e5274f
SHA1 hash: 80a4488db652d1da4a55a9fe3ef33dbb44b08675
MD5 hash: e76586ffea5c92002e4a8edf60b64bfe
humanhash: idaho-oregon-two-red
File name:babi.exe
Download: download sample
Signature WallStealer
File size:649'216 bytes
First seen:2026-02-28 12:33:44 UTC
Last seen:2026-03-01 09:46:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a330d858063c312aaac6d9eaeb29a36b (2 x WallStealer)
ssdeep 6144:6/FAnFeGb74gQ/Dmeqxt8UDRiiVxdB8+CbTrK9ZgnRs1VzYXWjPJAWzfO6rn:WA0sJQ/Zqb8RaxXaYQRkVkUTHrn
TLSH T112D47B0DA7A581F9D1B7D0B4CD038517EB72FC564732669B43E04A862F2BAA49F3DB10
TrID 37.0% (.EXE) Win64 Executable (generic) (6522/11/2)
28.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
11.3% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
Reporter burger
Tags:exe WallStealer

Intelligence


File Origin
# of uploads :
3
# of downloads :
117
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
babi.exe
Verdict:
Malicious activity
Analysis date:
2026-02-28 10:38:39 UTC
Tags:
stealer wallstealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
phishing cobalt
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm base64 crypto evasive fingerprint hacktool krypt microsoft_visual_cc stealer
Result
Gathering data
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan-PSW.Vidar.HTTP.C&C Trojan-PSW.Stealer.TCP.C&C Trojan-PSW.Stealer.HTTP.C&C Trojan-PSW.Lumma.TCP.C&C Trojan-PSW.Win32.Vidar.hxs
Result
Threat name:
WallStealer
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Creates a thread in another existing process (thread injection)
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected WallStealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1876351 Sample: babi.exe Startdate: 28/02/2026 Architecture: WINDOWS Score: 100 64 interactiom.top 2->64 66 steamcommunity.com 2->66 68 fg.microsoft.map.fastly.net 2->68 88 Suricata IDS alerts for network traffic 2->88 90 Multi AV Scanner detection for submitted file 2->90 92 Yara detected WallStealer 2->92 94 Joe Sandbox ML detected suspicious sample 2->94 8 babi.exe 2->8         started        12 msedge.exe 2->12         started        14 msedge.exe 2->14         started        signatures3 process4 dnsIp5 82 interactiom.top 151.243.113.70, 443, 49711, 49723 RASANAIR Iran (ISLAMIC Republic Of) 8->82 84 steamcommunity.com 23.222.161.105, 443, 49710 AKAMAI-ASUS United States 8->84 96 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->96 98 Hijacks the control flow in another process 8->98 100 Found many strings related to Crypto-Wallets (likely being stolen) 8->100 102 6 other signatures 8->102 16 msedge.exe 12 226 8->16         started        21 chrome.exe 8->21         started        23 msedge.exe 11 8->23         started        25 msedge.exe 12->25         started        27 msedge.exe 12->27         started        29 identity_helper.exe 12->29         started        31 identity_helper.exe 12->31         started        33 msedge.exe 14->33         started        signatures6 process7 dnsIp8 54 192.168.2.4, 138, 443, 49446 unknown unknown 16->54 56 239.255.255.250 unknown Reserved 16->56 50 C:\Users\user\AppData\Local\...\Login Data, SQLite 16->50 dropped 52 C:\Users\user\AppData\Local\...\History, SQLite 16->52 dropped 86 Found strings related to Crypto-Mining 16->86 35 msedge.exe 16->35         started        38 msedge.exe 16->38         started        40 msedge.exe 16->40         started        48 3 other processes 16->48 42 chrome.exe 21->42         started        44 WerFault.exe 16 21->44         started        46 msedge.exe 23->46         started        58 150.171.28.11, 443, 49793, 49794 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 25->58 60 teams-mrc-ww-perf.tm-4.office.com 52.123.241.42, 443, 49791 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 25->60 62 4 other IPs or domains 25->62 file9 signatures10 process11 dnsIp12 70 part-0041.t-0009.t-msedge.net 13.107.213.69, 443, 49771 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 35->70 72 13.107.246.69, 443, 49725, 49781 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 35->72 78 29 other IPs or domains 35->78 74 www.google.com 142.251.32.164, 443, 49730, 49731 GOOGLEUS United States 42->74 76 play.google.com 172.217.14.110, 443, 49757 GOOGLEUS United States 42->76 80 3 other IPs or domains 42->80
Gathering data
Threat name:
Win64.Infostealer.WallStealer
Status:
Malicious
First seen:
2026-02-26 04:07:24 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
24 of 36 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
System Time Discovery
Drops file in Windows directory
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
0d5b21c50ace8394dd64e9be86a4187362e6fe07af4be39ea5ed8c1d6fe937d0
MD5 hash:
e76586ffea5c92002e4a8edf60b64bfe
SHA1 hash:
80a4488db652d1da4a55a9fe3ef33dbb44b08675
Malware family:
WallStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

WallStealer

Executable exe 0d5b21c50ace8394dd64e9be86a4187362e6fe07af4be39ea5ed8c1d6fe937d0

(this sample)

Comments