MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3c086e76942fb9fd3d1e4384e9c1228c227c00c78dc29fca512ed95ee919ee5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ACRStealer
Vendor detections: 5
| SHA256 hash: | 3c086e76942fb9fd3d1e4384e9c1228c227c00c78dc29fca512ed95ee919ee5e |
|---|---|
| SHA3-384 hash: | 87ca809c6b4f9befcc1b7243c79b086156f65d5268083ebf32dd961051483f5c36942d900321c88b19dc9d5d1298e387 |
| SHA1 hash: | d713efc706c7b450e72ad7e210c1ae63194db571 |
| MD5 hash: | 30edf922187e578720c7b14aa1e38d76 |
| humanhash: | stairway-illinois-march-red |
| File name: | Free Download Files.zip |
| Download: | download sample |
| Signature | ACRStealer |
| File size: | 35'632'218 bytes |
| First seen: | 2025-12-11 17:08:47 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 786432:ZfpVSMnhZwVNXVCVGXPkuXhQOsYseq7to0fH2Jh2KNGCR:Zhph23YSQ7Y6qo2JhUCR |
| TLSH | T14377333D5A1D99F0FB4FE1B1E266840C40D21620A1B668AE7B3C36198D9F5D07B3276F |
| TrID | 46.6% (.SH3D) Sweet Home 3D Design (generic) (10500/1/3) 35.5% (.XPI) Mozilla Firefox browser extension (8000/1/1) 17.7% (.ZIP) ZIP compressed archive (4000/1) |
| Magika | zip |
| Reporter | |
| Tags: | ACRStealer game Python RenPy zip |
Intelligence
File Origin
# of uploads :
1
# of downloads :
129
Origin country :
DEVendor Threat Intelligence
Verdict:
Clean
Score:
99.9%
Tags:
n/a
Result
Verdict:
UNKNOWN
Link:
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
zip
First seen:
2025-12-11T03:54:00Z UTC
Last seen:
2025-12-12T06:02:00Z UTC
Hits:
~10
Score:
67%
Verdict:
Susipicious
File Type:
ARCHIVE
Gathering data
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.