MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 536a64b3267c5056b261d71324793571d02a8714bcb8f395927f72f77d004f56. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 10 File information Comments

SHA256 hash: 536a64b3267c5056b261d71324793571d02a8714bcb8f395927f72f77d004f56
SHA3-384 hash: 140ae24e9bf2c2569067908112f810887f122ef59e4aa19948ad5e72624228b5498196749d76c149f0392735ed3a7a10
SHA1 hash: 58bf5ec4b1537c2f66f6268fd3a9eaae0b2e80b2
MD5 hash: f4398f139f80cb47207ef34dc5b7df0c
humanhash: potato-autumn-asparagus-aspen
File name:QqcGyAXXOb.exe.bin
Download: download sample
Signature RustyStealer
File size:8'112'640 bytes
First seen:2025-04-10 16:12:12 UTC
Last seen:2025-04-11 12:29:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8fdc55298f940c875aa1bd09bb861527 (1 x RustyStealer)
ssdeep 196608:S/6hdvzR8Wnvak3c4V9034kNjjQbfPSLxc2AEuxH22We8Ejr:S/6hd6Uak3c404AQ21cdW2Wf2r
Threatray 1 similar samples on MalwareBazaar
TLSH T1CC862316A66444E4D687C07CCB8B4A1BD7B178860B20A7EF16C467761F379E52F3B328
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon 70e4868e8ee6f870 (3 x RustyStealer, 1 x AsyncRAT, 1 x SVCStealer)
Reporter g0njxa
Tags:91-92-46-133 exe RustyStealer Stealc-v2

Intelligence


File Origin
# of uploads :
3
# of downloads :
483
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Drakthos.exe
Verdict:
Malicious activity
Analysis date:
2025-04-10 15:45:33 UTC
Tags:
evasion rust stealer stealcv2

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.2%
Tags:
emotet spawn
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Connection attempt
Sending an HTTP POST request
Launching the default Windows debugger (dwwin.exe)
Creating a file
Reading critical registry keys
Creating a window
Running batch commands
Creating a process with a hidden window
Moving of the original file
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug anti-vm expand lolbin masquerade microsoft_visual_cc packed packed packer_detected rust
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates / moves files in alternative data streams (ADS)
Deletes itself after installation
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Suspect Svchost Activity
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.RustyStealer
Status:
Malicious
First seen:
2025-04-10 16:13:22 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Deletes itself
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
536a64b3267c5056b261d71324793571d02a8714bcb8f395927f72f77d004f56
MD5 hash:
f4398f139f80cb47207ef34dc5b7df0c
SHA1 hash:
58bf5ec4b1537c2f66f6268fd3a9eaae0b2e80b2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::TerminateProcess
kernel32.dll::LoadLibraryExA
kernel32.dll::LoadLibraryA
WIN_BASE_EXEC_APICan Execute other programskernel32.dll::WriteConsoleW
kernel32.dll::GetConsoleOutputCP
kernel32.dll::GetConsoleMode

Comments