MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58e674636ca1d0dfac7e39debd343d652df870f7c582561baf68c38f585410d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments 1

SHA256 hash: 58e674636ca1d0dfac7e39debd343d652df870f7c582561baf68c38f585410d2
SHA3-384 hash: 3edc906f31dd08c5a8bfc3a581d15c1d32fdbcdf5976ec248762f6c8ff16a0c45959966d7d4806638ccadce17a2e50f5
SHA1 hash: 58b15f56c870987a673c5db436a9fa1677a146b2
MD5 hash: d16df5a6a394820b2271898b31703862
humanhash: johnny-two-hamper-finch
File name:d16df5a6a394820b2271898b31703862
Download: download sample
Signature RustyStealer
File size:7'186'761 bytes
First seen:2022-12-11 07:09:10 UTC
Last seen:2022-12-11 08:28:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c6d1a60b30b8dc763577ff55f44360f0 (1 x RustyStealer)
ssdeep 98304:DVyxQbaRbcR1Mp2DdAG7qDA9faD5n7V78G2R4f8zXEULYhkxl:bEbc19fSgX
TLSH T1B1768D01ECF82B34D9D7EA3585AE622577313F55D716CFA30836E3B59463292EF1A208
TrID 41.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
26.1% (.EXE) Win64 Executable (generic) (10523/12/4)
12.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.1% (.ICL) Windows Icons Library (generic) (2059/9)
5.0% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter zbetcheckin
Tags:exe RustyStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm greyware hacktool overlay packed shell32.dll spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
adwa.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Drops PE files to the startup folder
Early bird code injection technique detected
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries temperature or sensor information (via WMI often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sample is not signed and drops a device driver
Sigma detected: Powershell adding suspicious path to exclusion list
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 764851 Sample: Pbnc5ctKw1.exe Startdate: 11/12/2022 Architecture: WINDOWS Score: 100 94 time.windows.com 2->94 96 cdn.discordapp.com 2->96 104 Antivirus detection for dropped file 2->104 106 Antivirus / Scanner detection for submitted sample 2->106 108 Multi AV Scanner detection for dropped file 2->108 110 6 other signatures 2->110 13 lhiop.exe 3 2->13         started        17 Pbnc5ctKw1.exe 8 2->17         started        20 8y83imp9.sys 2->20         started        22 3 other processes 2->22 signatures3 process4 dnsIp5 102 85.209.135.181, 49857, 58001 CMCSUS Germany 13->102 134 Antivirus detection for dropped file 13->134 136 Multi AV Scanner detection for dropped file 13->136 138 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 13->138 140 Encrypted powershell cmdline option found 13->140 24 powershell.exe 13->24         started        28 powershell.exe 13->28         started        82 C:\Users\user\AppData\Roaming\...\stub.exe, PE32+ 17->82 dropped 84 C:\Users\user\AppData\Local\oeomk\lhiop.exe, PE32+ 17->84 dropped 86 C:\Users\user\...\stub.exe:Zone.Identifier, ASCII 17->86 dropped 88 2 other malicious files 17->88 dropped 142 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 17->142 144 Drops PE files to the startup folder 17->144 146 Adds a directory exclusion to Windows Defender 17->146 148 Allocates many large memory junks 17->148 30 powershell.exe 27 17->30         started        33 cmd.exe 22->33         started        35 powershell.exe 22->35         started        file6 signatures7 process8 dnsIp9 100 cdn.discordapp.com 162.159.129.233, 443, 49858, 49864 CLOUDFLARENETUS United States 24->100 92 C:\Users\user\AppData\Local\...\ueinnpoto.exe, PE32+ 24->92 dropped 37 ueinnpoto.exe 24->37         started        40 conhost.exe 24->40         started        42 conhost.exe 28->42         started        150 Powershell drops PE file 30->150 44 conhost.exe 30->44         started        46 fodhelper.exe 33->46         started        48 conhost.exe 33->48         started        50 fodhelper.exe 33->50         started        52 fodhelper.exe 33->52         started        54 conhost.exe 35->54         started        file10 signatures11 process12 signatures13 112 Detected unpacking (creates a PE file in dynamic memory) 37->112 114 Early bird code injection technique detected 37->114 116 Machine Learning detection for dropped file 37->116 118 4 other signatures 37->118 56 wuauclt.exe 37->56         started        59 stub.exe 46->59         started        process14 signatures15 124 Early bird code injection technique detected 56->124 126 Writes to foreign memory regions 56->126 128 Allocates memory in foreign processes 56->128 130 Injects a PE file into a foreign processes 56->130 61 wusa.exe 56->61         started        63 wuauclt.exe 56->63         started        132 Adds a directory exclusion to Windows Defender 59->132 65 powershell.exe 59->65         started        process16 process17 67 mmc.exe 61->67         started        72 conhost.exe 65->72         started        dnsIp18 98 127.0.0.1 unknown unknown 67->98 90 C:\Users\user\AppData\Roaming\8y83imp9.sys, PE32+ 67->90 dropped 120 Adds a directory exclusion to Windows Defender 67->120 122 Sample is not signed and drops a device driver 67->122 74 powershell.exe 67->74         started        76 powershell.exe 67->76         started        file19 signatures20 process21 process22 78 conhost.exe 74->78         started        80 conhost.exe 76->80         started       
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2022-12-09 09:38:07 UTC
File Type:
PE+ (Exe)
AV detection:
8 of 26 (30.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops startup file
Unpacked files
SH256 hash:
58e674636ca1d0dfac7e39debd343d652df870f7c582561baf68c38f585410d2
MD5 hash:
d16df5a6a394820b2271898b31703862
SHA1 hash:
58b15f56c870987a673c5db436a9fa1677a146b2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RustyStealer

Executable exe 58e674636ca1d0dfac7e39debd343d652df870f7c582561baf68c38f585410d2

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-12-11 07:09:15 UTC

url : hxxp://85.209.135.181/files/demo.exe