MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 393c38626cfc87137e608d53a9d5334d86b9ee941bd90bb17ec7083ba19b1a21. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SantaStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 12 File information Comments

SHA256 hash: 393c38626cfc87137e608d53a9d5334d86b9ee941bd90bb17ec7083ba19b1a21
SHA3-384 hash: 48b3b15ef081ce07a3096502ef9c00829b0150b7d4540ace6a2b53e86819eb72670715fa5480b83cdff26d94cfd6303b
SHA1 hash: c24af8d5c176f696e2a3f2811fe6a61de1fa7563
MD5 hash: 59238b0148bdd2e89a7d0f6585f2d442
humanhash: hawaii-seven-eleven-minnesota
File name:file
Download: download sample
Signature SantaStealer
File size:4'518'912 bytes
First seen:2026-03-13 16:21:12 UTC
Last seen:2026-03-13 16:48:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ea70062ad183fad959af98c29f55101 (1 x SantaStealer)
ssdeep 49152:VgmnbwUuzhQb2ZktsQeaE81uXjxmCg9RmO+EQRVun25yPpO011VZvc1VOlsz0VgC:Owb2dQehXjcfIQpOG7ZE78CpjqjQsA
TLSH T14A267C07E19223ECC46AC1FCC7D7A232B6357C454534ADBB5170F6312E72E9C6A69E28
TrID 45.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
18.0% (.EXE) Win64 Executable (generic) (6522/11/2)
13.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.6% (.ICL) Windows Icons Library (generic) (2059/9)
5.6% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter Bitsight
Tags:dropped-by-amadey exe fbf543 SantaStealer


Avatar
Bitsight
url: http://158.94.208.7/files/8468794285/dSBZqK0.exe

Intelligence


File Origin
# of uploads :
12
# of downloads :
199
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
teamviewer
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2026-03-13 16:23:40 UTC
Tags:
github stealer teamviewer rmm-tool tightvnc loader ip-check ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal emotet lien
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug crypto crypto expand fingerprint infostealer lolbin meterpreter overlay packed packed rundll32
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan-PSW.Win32.Lumma.sb Trojan-PSW.Win32.Greedy.sb Trojan-PSW.Win32.Coins.sb Trojan-PSW.MSIL.Stealer.sb Trojan.Win32.Agent.sb Trojan-PSW.Win32.Stealer.sb Trojan-Spy.Stealer.TCP.C&C Trojan-PSW.Win32.Lumma.abpm Trojan.Win32.Inject.sb Trojan-PSW.Win32.Pycoon.sb Trojan-Spy.Stealer.HTTP.C&C Trojan-Spy.Agent.HTTP.C&C PDM:Trojan.Win32.Generic Trojan-PSW.TeleBot.TCP.C&C Trojan-PSW.Stealer.HTTP.C&C Trojan-PSW.Win32.Vidar.sb Trojan-Spy.Win32.SpyEyes
Gathering data
Threat name:
Win64.Hacktool.PSWDump
Status:
Malicious
First seen:
2026-03-13 16:22:22 UTC
File Type:
PE+ (Exe)
Extracted files:
51
AV detection:
15 of 24 (62.50%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
credential_access discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Browser Information Discovery
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Contacts third-party web service commonly abused for C2
Looks up external IP address via web service
Checks computer location settings
Credentials from Password Stores: Windows Credential Manager
Executes dropped EXE
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Unpacked files
SH256 hash:
393c38626cfc87137e608d53a9d5334d86b9ee941bd90bb17ec7083ba19b1a21
MD5 hash:
59238b0148bdd2e89a7d0f6585f2d442
SHA1 hash:
c24af8d5c176f696e2a3f2811fe6a61de1fa7563
SH256 hash:
d0f6ab648cb447f5fbbdc00df51f8478ee9427a4139d853a09aedae67518e3e3
MD5 hash:
cf97d2e037ee5cdbed576097a0bc6dfe
SHA1 hash:
41fd34af332d6e1a173ade71ab0fa9d29c9fd71b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Heuristics_ChromeABE
Author:Still
Description:attempts to match instructions related to Chrome App-bound Encryption elevation service; possibly spotted amongst infostealers
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SantaStealer

Executable exe 393c38626cfc87137e608d53a9d5334d86b9ee941bd90bb17ec7083ba19b1a21

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments