MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 415952a85736d07c8bff35ce470b5fd3f47e83f9b27163980ca7febf3d437556. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ScarfaceStealer


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 415952a85736d07c8bff35ce470b5fd3f47e83f9b27163980ca7febf3d437556
SHA3-384 hash: 9f004c4c83d1a7a84c967ccd20062b1b0afecca15a36376b64df9b3be9f5b5134f5fe56c649dd611025343ba1a0f743c
SHA1 hash: 5680ed74772ba8b9c25bde13ba4d0ac58868f956
MD5 hash: 0f2fa975a1c50608d17b510b7cf873b0
humanhash: dakota-freddie-six-quiet
File name:Nexora.exe
Download: download sample
Signature ScarfaceStealer
File size:71'354'880 bytes
First seen:2026-03-01 16:10:38 UTC
Last seen:2026-03-01 16:40:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 772ec87d3452991a9933a3ba0d9963a9 (13 x ScarfaceStealer)
ssdeep 393216:hn1XQgPR2k3m5C507G9ITEc5eAlkLbQurxMWhAsIyNOPS0B4AycWsCYaxFzwW/tL:h1XR7AsxYqt2oRGj5rs3wb8/
TLSH T1B5F7594262EA04C4F9F7DA359AE65217D673BC166F3081CF325C172A1F736E08976B22
TrID 37.0% (.EXE) Win64 Executable (generic) (6522/11/2)
28.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
11.3% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
Reporter burger
Tags:exe Rhadamanthys ScarfaceStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
128
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Nexora.exe
Verdict:
No threats detected
Analysis date:
2026-03-01 16:10:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm crypto expand fingerprint lolbin microsoft_visual_cc
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Gathering data
Result
Malware family:
n/a
Score:
  6/10
Tags:
defense_evasion discovery
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates processes with tasklist
Obfuscated Files or Information: Command Obfuscation
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments