MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 401dec3bbc8bd4ce87cc0bb4ac8aedf6f40205b89476fb4b9ba9ebe0b135d459. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GenesisStealer


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 401dec3bbc8bd4ce87cc0bb4ac8aedf6f40205b89476fb4b9ba9ebe0b135d459
SHA3-384 hash: 63d2949e9749463f4821c1d22e6579f0c0fb35dd802a39c03c5a14b21773b9ea779b35fc320d61b1a61b7ae72558f31b
SHA1 hash: fb0521ff2151b4b29f08dacbb82fcb7d6d416b1b
MD5 hash: 6ce470dd2f4051c08cf5a5f7276e15cb
humanhash: oregon-sixteen-bluebird-december
File name:Teste123Game Setup 2.1.1.exe
Download: download sample
Signature GenesisStealer
File size:91'857'124 bytes
First seen:2026-01-20 18:17:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (563 x GuLoader, 120 x RemcosRAT, 82 x EpsilonStealer)
ssdeep 1572864:gg+BWqL9BHb/0pF+rCIKxLwbzseh/5lOWkrOK6RNzaGYcbne2yt0EFjWlkqs:gxB1LmU2f1wbrt5l3wv+nejbF6lvs
Threatray 800 similar samples on MalwareBazaar
TLSH T120183314ABDCB269DD63DBF7EDE62D205537734688E0514A3F96A0DC06B0E01BC5BEA0
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 28969696969696e8 (18 x GenesisStealer, 2 x MythStealer, 1 x QuasarRAT)
Reporter burger
Tags:exe GenesisStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
103
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Teste123GameSetup2.1.1.exe
Verdict:
Malicious activity
Analysis date:
2026-01-20 18:16:36 UTC
Tags:
evasion anti-evasion discord stealer possible-phishing generic arch-doc nodejs

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
shell virus sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm anti-vm blackhole fingerprint installer installer installer-heuristic microsoft_visual_cc nsis packed soft-404 unsafe
Verdict:
Suspicious
Labled as:
MSIL_CaptureScreen_A_potentially_unsafe_application
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-20T15:37:00Z UTC
Last seen:
2026-01-21T06:14:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-PSW.Script.Generic
Result
Threat name:
Genesis Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Attempt to bypass Chrome Application-Bound Encryption
Detected Genesis Stealer
Drops large PE files
Excessive usage of taskkill to terminate processes
Loading BitLocker PowerShell Module
Obfuscated command line found
Performs DNS queries to domains with low reputation
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive system registry key value via command line tool
Sigma detected: Capture Wi-Fi password
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Suspicious powershell command line found
Tries to harvest and steal WLAN passwords
Unusual module load detection (module proxying)
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1854217 Sample: Teste123Game Setup 2.1.1.exe Startdate: 20/01/2026 Architecture: WINDOWS Score: 100 62 panel.kalygenesis.xyz 2->62 64 api.kalygenesis.xyz 2->64 66 7 other IPs or domains 2->66 92 Sigma detected: Capture Wi-Fi password 2->92 94 Drops large PE files 2->94 96 Sigma detected: Potential Data Stealing Via Chromium Headless Debugging 2->96 8 Teste123Game.exe 2->8         started        13 Teste123Game Setup 2.1.1.exe 13 431 2->13         started        15 Teste123Game.exe 2->15         started        signatures3 98 Performs DNS queries to domains with low reputation 64->98 process4 dnsIp5 68 api.kalygenesis.xyz 45.141.215.60, 443, 49720, 49722 SPECTRAIPSpectraIPBVNL Netherlands 8->68 70 ip-api.com 208.95.112.1, 49721, 80 TUT-ASUS United States 8->70 72 3 other IPs or domains 8->72 52 C:\Users\...behaviorgraphenesis_System_1768933254507.zip, Zip 8->52 dropped 100 Detected Genesis Stealer 8->100 102 Suspicious powershell command line found 8->102 104 Obfuscated command line found 8->104 106 Excessive usage of taskkill to terminate processes 8->106 17 cmd.exe 8->17         started        20 powershell.exe 8->20         started        22 cmd.exe 8->22         started        30 48 other processes 8->30 54 C:\Users\user\AppData\...\Teste123Game.exe, PE32+ 13->54 dropped 56 C:\Users\user\AppData\Local\...\nsis7z.dll, PE32 13->56 dropped 58 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 13->58 dropped 60 19 other files (none is malicious) 13->60 dropped 24 powershell.exe 23 13->24         started        26 powershell.exe 21 13->26         started        28 powershell.exe 13->28         started        108 Attempt to bypass Chrome Application-Bound Encryption 15->108 110 Tries to harvest and steal WLAN passwords 15->110 112 Unusual module load detection (module proxying) 15->112 file6 signatures7 process8 dnsIp9 76 Uses cmd line tools excessively to alter registry or file data 17->76 78 Uses netsh to modify the Windows network and firewall settings 17->78 80 Tries to harvest and steal WLAN passwords 17->80 33 conhost.exe 17->33         started        35 chcp.com 17->35         started        82 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 20->82 84 Queries memory information (via WMI often done to detect virtual machines) 20->84 37 conhost.exe 20->37         started        86 Queries sensitive system registry key value via command line tool 22->86 48 2 other processes 22->48 88 Loading BitLocker PowerShell Module 24->88 39 conhost.exe 24->39         started        41 conhost.exe 26->41         started        43 conhost.exe 28->43         started        74 chrome.cloudflare-dns.com 172.64.41.3, 443, 49724 CLOUDFLARENETUS United States 30->74 90 Excessive usage of taskkill to terminate processes 30->90 45 powershell.exe 30->45         started        50 65 other processes 30->50 signatures10 process11 signatures12 114 Loading BitLocker PowerShell Module 45->114
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2026-01-20 01:54:35 UTC
File Type:
PE (Exe)
Extracted files:
6638
AV detection:
8 of 37 (21.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
antivm credential_access defense_evasion discovery execution linux persistence privilege_escalation ransomware spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Wi-Fi Discovery
System Time Discovery
Drops file in Windows directory
Hide Artifacts: Ignore Process Interrupts
Launches sc.exe
Enumerates processes with tasklist
Checks installed software on the system
Contacts third-party web service commonly abused for C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Disables one or more Microsoft Defender components
Uses browser remote debugging
Windows security bypass
Malware family:
GenesisStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

GenesisStealer

Executable exe 401dec3bbc8bd4ce87cc0bb4ac8aedf6f40205b89476fb4b9ba9ebe0b135d459

(this sample)

Comments