MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58a5e3bb70bcb50147587807794bcee8ee3c7e5c67a630b092e7899d2a50c83b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DeerStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments

SHA256 hash: 58a5e3bb70bcb50147587807794bcee8ee3c7e5c67a630b092e7899d2a50c83b
SHA3-384 hash: 98e5f192ece919a024a02487886bc50bcc1e140db64b3b20d7c5db091433a91f831453f1929b89192cdceb6aa6bdd471
SHA1 hash: 2136b9b45bdd1559f774440c574dceb389995f19
MD5 hash: 58b96ec8d8838c2369a1c926da4f8702
humanhash: texas-lactose-pluto-uranus
File name:jzQILRF.exe
Download: download sample
Signature DeerStealer
File size:7'971'141 bytes
First seen:2025-06-09 10:02:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b5a014d7eeb4c2042897567e1288a095 (19 x HijackLoader, 14 x ValleyRAT, 12 x LummaStealer)
ssdeep 196608:+podLmWdR4rznEOaZRICxT4LFm8aVzYGFEr175:+podLmWvYvaZOCR4Lc8GCrH
TLSH T1AA8633423B81EDE2C4548DB99FD9CF33D577EBA12AA115438BA84D08ADC34F212479DE
TrID 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
24.6% (.EXE) Win64 Executable (generic) (10522/11/4)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon c292ecd8f2f6fe1c (15 x HijackLoader, 11 x LummaStealer, 7 x Arechclient2)
Reporter abuse_ch
Tags:DeerStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
375
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-06-09 09:45:27 UTC
Tags:
auto-sch loader amadey botnet stealer darkvision remote telegram lumma themida rdp auto pastebin xworm rat github purecrypter miner gcleaner asyncrat arch-exec coinminer fileshare netreactor purehvnc evasion generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Creating a file in the %AppData% subdirectories
DNS request
Connection attempt
Sending a custom TCP request
Unauthorized injection to a recently created process by context flags manipulation
Result
Threat name:
Deer Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected Deer Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1709586 Sample: jzQILRF.exe Startdate: 09/06/2025 Architecture: WINDOWS Score: 100 116 hugevcdn.pro 2->116 118 anymeshes.pro 2->118 120 4 other IPs or domains 2->120 142 Suricata IDS alerts for network traffic 2->142 144 Malicious sample detected (through community Yara rule) 2->144 146 Multi AV Scanner detection for submitted file 2->146 148 2 other signatures 2->148 12 jzQILRF.exe 11 2->12         started        15 VortexX-Beta32.exe 2->15         started        17 TransmitterDe.exe 2->17         started        signatures3 process4 file5 94 C:\Users\user\AppData\...\TransmitterDe.exe, PE32 12->94 dropped 96 C:\Users\user\AppData\Local\Temp\tier0.dll, PE32 12->96 dropped 98 C:\Users\user\AppData\...\VCRUNTIME140.dll, PE32 12->98 dropped 110 4 other files (none is malicious) 12->110 dropped 20 TransmitterDe.exe 10 12->20         started        24 chrome.exe 12->24         started        27 chrome.exe 12->27         started        100 C:\ProgramData\...\VortexX-Beta32.exe, PE32 15->100 dropped 102 C:\ProgramData\...\packager.dll, PE32 15->102 dropped 104 C:\ProgramData\...\VCRUNTIME140.dll, PE32 15->104 dropped 106 C:\ProgramData\...\MSVCP140.dll, PE32 15->106 dropped 29 VortexX-Beta32.exe 15->29         started        108 C:\Users\user\AppData\Local\...\C82DF03.tmp, PE32+ 17->108 dropped 138 Modifies the context of a thread in another process (thread injection) 17->138 140 Maps a DLL or memory area into another process 17->140 31 SSimulator.exe 17->31         started        33 XPFix.exe 17->33         started        signatures6 process7 dnsIp8 74 C:\ProgramData\...\TransmitterDe.exe, PE32 20->74 dropped 76 C:\ProgramData\systemFast_BYY\tier0.dll, PE32 20->76 dropped 78 C:\ProgramData\...\VCRUNTIME140.dll, PE32 20->78 dropped 82 4 other files (none is malicious) 20->82 dropped 158 Switches to a custom stack to bypass stack traces 20->158 160 Found direct / indirect Syscall (likely to bypass EDR) 20->160 35 TransmitterDe.exe 7 20->35         started        128 www.google.com 142.251.186.147, 443, 49704 GOOGLEUS United States 24->128 130 plus.l.google.com 24->130 132 6 other IPs or domains 24->132 80 C:\Users\user\AppData\Local\...\D8A4B4A.tmp, PE32+ 29->80 dropped 162 Modifies the context of a thread in another process (thread injection) 29->162 164 Found hidden mapped module (file has been removed from disk) 29->164 166 Maps a DLL or memory area into another process 29->166 39 DeltaS.exe 29->39         started        41 XPFix.exe 29->41         started        file9 signatures10 process11 file12 68 C:\Users\user\SSimulator.exe, PE32+ 35->68 dropped 70 C:\Users\user\AppData\Roaming\...\XPFix.exe, PE32 35->70 dropped 72 C:\Users\user\AppData\Local\...\B73700D.tmp, PE32+ 35->72 dropped 150 Drops PE files to the user root directory 35->150 152 Modifies the context of a thread in another process (thread injection) 35->152 154 Found hidden mapped module (file has been removed from disk) 35->154 156 3 other signatures 35->156 43 SSimulator.exe 2 35->43         started        48 XPFix.exe 35->48         started        50 WMIADAP.exe 35->50         started        signatures13 process14 dnsIp15 134 hugevcdn.pro 172.67.218.138, 443, 49694 CLOUDFLARENETUS United States 43->134 136 multiport.shop 172.67.203.146, 443, 49695 CLOUDFLARENETUS United States 43->136 112 C:\Users\...\V0YAh5CPP9tS4aoNLXWPIuA8AR55.exe, PE32 43->112 dropped 176 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 43->176 178 Tries to harvest and steal browser information (history, passwords, etc) 43->178 180 Writes to foreign memory regions 43->180 186 3 other signatures 43->186 52 V0YAh5CPP9tS4aoNLXWPIuA8AR55.exe 8 43->52         started        55 chrome.exe 43->55         started        182 Switches to a custom stack to bypass stack traces 48->182 184 Found direct / indirect Syscall (likely to bypass EDR) 48->184 file16 signatures17 process18 dnsIp19 84 C:\Users\user\AppData\...\VortexX-Beta32.exe, PE32 52->84 dropped 86 C:\Users\user\AppData\Local\...\packager.dll, PE32 52->86 dropped 58 VortexX-Beta32.exe 7 52->58         started        122 192.168.2.5, 138, 443, 49172 unknown unknown 55->122 124 192.168.2.14 unknown unknown 55->124 126 4 other IPs or domains 55->126 file20 process21 file22 88 C:\Users\user\AppData\Roaming\...\XPFix.exe, PE32 58->88 dropped 90 C:\ProgramData\DeltaS.exe, PE32+ 58->90 dropped 92 C:\Users\user\AppData\Local\...\C75D9B4.tmp, PE32+ 58->92 dropped 168 Modifies the context of a thread in another process (thread injection) 58->168 170 Found hidden mapped module (file has been removed from disk) 58->170 172 Maps a DLL or memory area into another process 58->172 174 Switches to a custom stack to bypass stack traces 58->174 62 XPFix.exe 58->62         started        65 DeltaS.exe 58->65         started        signatures23 process24 dnsIp25 188 Switches to a custom stack to bypass stack traces 62->188 114 anymeshes.pro 172.67.205.173, 49714, 80 CLOUDFLARENETUS United States 65->114 signatures26
Threat name:
Win32.Adware.RedCap
Status:
Malicious
First seen:
2025-06-09 10:03:33 UTC
File Type:
PE (Exe)
Extracted files:
54
AV detection:
18 of 24 (75.00%)
Threat level:
  1/5
Result
Malware family:
hijackloader
Score:
  10/10
Tags:
family:donutloader family:hijackloader discovery loader spyware stealer
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Detects DonutLoader
Detects HijackLoader (aka IDAT Loader)
DonutLoader
Donutloader family
HijackLoader
Hijackloader family
Unpacked files
SH256 hash:
58a5e3bb70bcb50147587807794bcee8ee3c7e5c67a630b092e7899d2a50c83b
MD5 hash:
58b96ec8d8838c2369a1c926da4f8702
SHA1 hash:
2136b9b45bdd1559f774440c574dceb389995f19
SH256 hash:
4c315e81273b8cb4242c94763e4c1deeea6821338b2a728123f06e45c78b707e
MD5 hash:
2f56c1615db93c8125ded2bdba5c57ed
SHA1 hash:
1e87408fc8e39a50855c377f8e8c4b7f000331a5
SH256 hash:
9288a0f6a6aeda8295dc09198e4991d58b641930c54c7cf1d3a0caa1971d42c9
MD5 hash:
66099edff44f9af0db2e20e00830e3c4
SHA1 hash:
4de0b2093902bead0fa452ffe82e87318c9b930b
SH256 hash:
c494f96b809ff23cee0491548d46856848bec90be2d012a10548142687abf5b0
MD5 hash:
9d9dfeb7dc6c4d971aafab84660a8c7e
SHA1 hash:
668c3a096b54d2f6d232b03c1c6bc9c8d00fa7ad
SH256 hash:
43c8b87034f2298afb7f7081a52b2ab02854c552a8dcb3ceff11bbb0b0e41572
MD5 hash:
e6f21b548def9f65233f8343fb27d310
SHA1 hash:
8df4c82581e51758666fc84f5c620b726710c73f
SH256 hash:
7b40800458be46f5f74d2d5468d4667bcd9bbc8f39ebb527685d6fcb60f125eb
MD5 hash:
ff1594b84f8e96394a34ffd1f446b7bb
SHA1 hash:
d30b8615de0fb06768d3904a73791fa4e7cfb9d8
SH256 hash:
aebec5ee933e920becfb0f1dacafc676e4fe482723263abc5daf9a8d6852ad98
MD5 hash:
47263d7131cf3a3083590ede0a3846ae
SHA1 hash:
ef231e061ac3dbc43eeba07389a0ed8f3b6cca1e
SH256 hash:
7e7370b6e18f96ff3ddde9983ffafe456415847f07553ed00632a5f5987db87c
MD5 hash:
7676db34394eb3290e0458db18575595
SHA1 hash:
ff832b257a72e43e7bcb8295cede57aff635d70e
SH256 hash:
a6edb3fb6d21dd461da3767a7995034e208f7d6b08997f6cf7ee7b0ea833a8f0
MD5 hash:
cabb58bb5694f8b8269a73172c85b717
SHA1 hash:
9ed583c56385fed8e5e0757ddb2fdf025f96c807
SH256 hash:
68bee500e0080f21c003126e73b6d07804d23ac98b2376a8b76c26297d467abe
MD5 hash:
d4dae7149d6e4dab65ac554e55868e3b
SHA1 hash:
b3bea0a0a1f0a6f251bcf6a730a97acc933f269a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:pe_detect_tls_callbacks
Rule name:SUSP_XORed_Mozilla_Oct19
Author:Florian Roth
Description:Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
Reference:https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force()
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:sus_pe_free_without_allocation
Author:Maxime THIEBAUT (@0xThiebaut)
Description:Detects an executable importing functions to free memory without importing allocation functions, often indicative of dynamic import resolution
Rule name:Windows_Trojan_GhostPulse_caea316b
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DeerStealer

Executable exe 58a5e3bb70bcb50147587807794bcee8ee3c7e5c67a630b092e7899d2a50c83b

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
ole32.dll::CreateStreamOnHGlobal
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetDriveTypeW
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetDiskFreeSpaceExW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::GetSystemDirectoryW
KERNEL32.dll::GetFileAttributesW
KERNEL32.dll::FindFirstFileW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExW

Comments