MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45f93ac0b19e3404dd4b9141173bb6d399b2a07087748d85791f3ff09595f805. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DeerStealer


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 45f93ac0b19e3404dd4b9141173bb6d399b2a07087748d85791f3ff09595f805
SHA3-384 hash: e72804d20fc1e3cb407b04f7fe9c5b1eb790f67b7154291ad2cae471b3471529de677cf2f9894b4b32fb12f3a7c1e4c5
SHA1 hash: 74f5c7754855a7c8758bca9ce41db33a29393305
MD5 hash: 2d1ba28d765b1621e21385de393af4a4
humanhash: happy-avocado-ack-glucose
File name:dk.vbs
Download: download sample
Signature DeerStealer
File size:770 bytes
First seen:2025-12-17 16:53:35 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 12:9vWdb6K1HeIThhi88Ot5JbHyYUMfffFqCDi+ikixik+KwS0lUD:9AW2jiV2bSYlfNDhWxiqwK
Threatray 20 similar samples on MalwareBazaar
TLSH T1DF01CB17DD26D1E8463485F987604A0ACCC2F4A392565C39B95CCC266F720BDA8B41FF
Magika vba
Reporter pr0xylife
Tags:DeerStealer vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
48
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
94.1%
Tags:
trojandownloader virus html
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive lolbin msiexec
Verdict:
Malicious
File Type:
vbs
First seen:
2025-12-17T05:39:00Z UTC
Last seen:
2025-12-18T23:02:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.OLE2.Alien.gen Trojan-Downloader.VBS.SLoad.sb Trojan.Win32.Strab.sb Trojan.Win32.Penguish.sb HEUR:Trojan.VBS.Alien.gen Trojan.Win32.DLLhijack.acib Trojan.Win32.DLLhijack.acic
Verdict:
Malware
YARA:
1 match(es)
Tags:
ADODB.Stream MSXML2.ServerXMLHTTP.6.0 VBScript WScript.Shell
Result
Malware family:
hijackloader
Score:
  10/10
Tags:
family:deerstealer family:hijackloader defense_evasion discovery loader stealer
Behaviour
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Enumerates connected drives
Indicator Removal: File Deletion
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
DeerStealer
Deerstealer family
Detects DeerStealer
Detects HijackLoader (aka IDAT Loader)
HijackLoader, IDAT loader, Ghostulse,
Hijackloader family
Malware family:
IDATLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DeerStealer

Visual Basic Script (vbs) vbs 45f93ac0b19e3404dd4b9141173bb6d399b2a07087748d85791f3ff09595f805

(this sample)

  
Delivery method
Distributed via web download

Comments