MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3ba374b61e98b6d598d83f902d5ed73a26a3ddecf910fafb05825dcb3e7dd6bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
XillenStealer
Vendor detections: 11
| SHA256 hash: | 3ba374b61e98b6d598d83f902d5ed73a26a3ddecf910fafb05825dcb3e7dd6bb |
|---|---|
| SHA3-384 hash: | f4324e453ad71063bcffdfaa63b368572e1c91a586b04b39b8a8830637ca820d5a4997581be759e81455a5f8673d4734 |
| SHA1 hash: | 6d0e58ef80f592d94f41be0d63499b7513f44174 |
| MD5 hash: | f2db15f4b18176066b54f9210c14cf3f |
| humanhash: | salami-kilo-helium-enemy |
| File name: | 3ba374b61e98b6d598d83f902d5ed73a26a3ddecf910fafb05825dcb3e7dd6bb |
| Download: | download sample |
| Signature | XillenStealer |
| File size: | 186'880 bytes |
| First seen: | 2026-01-30 18:39:19 UTC |
| Last seen: | 2026-01-30 19:33:43 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | dfa41fbc174fda9c46816c7386c7ccde (2 x XillenStealer) |
| ssdeep | 3072:uOx1K1/TrAaVvfrDj5+zXxw8nsa8rx4lYTM4h49G:ri/TrAQvTXwLqwL78 |
| TLSH | T14C044C07E6924CFDD836D1B4969BE337E570F8045238EA6F1A90CB252E1AE70722DF45 |
| TrID | 41.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 26.1% (.EXE) Win64 Executable (generic) (10522/11/4) 12.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.1% (.ICL) Windows Icons Library (generic) (2059/9) 5.0% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| Reporter | |
| Tags: | exe goldenring-live XillenStealer |
Intelligence
File Origin
ITVendor Threat Intelligence
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BunnyLoader |
|---|---|
| Author: | indest |
| Description: | generic crypto/card stealer rule |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | FreddyBearDropper |
|---|---|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| Rule name: | HKTL_Meterpreter_inMemory |
|---|---|
| Author: | netbiosX, Florian Roth |
| Description: | Detects Meterpreter in-memory |
| Reference: | https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/ |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs |
|---|---|
| Author: | ditekSHen |
| Description: | Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | Macos_Infostealer_Wallets_8e469ea0 |
|---|---|
| Author: | Elastic Security |
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | ReflectiveLoader |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended |
| Reference: | Internal Research |
| Rule name: | telebot_framework |
|---|---|
| Author: | vietdx.mb |
| Rule name: | TelegramAPIMalware_PowerShell_EXE |
|---|---|
| Author: | @polygonben |
| Description: | Hunting for pwsh malware using Telegram for C2 |
| Rule name: | vmdetect |
|---|---|
| Author: | nex |
| Description: | Possibly employs anti-virtualization techniques |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.