MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5a616be3a292055d1bfb135bf6ad6ff9be4cd4e8019f819bead20937e2dd96b4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 13


Intelligence 13 IOCs YARA 6 File information Comments 1

SHA256 hash: 5a616be3a292055d1bfb135bf6ad6ff9be4cd4e8019f819bead20937e2dd96b4
SHA3-384 hash: 15907b94df90158fcdd2f6c08c1770cf2234b6aa17deef96575b3a69a1ec7783274524e7b34e7b949373b7513b83f54b
SHA1 hash: e8bff616100ccd9452362f90d0d3f94b860d2bf4
MD5 hash: 8f8fc7f7442eb1d14acf3593e773463b
humanhash: tennessee-ink-florida-bulldog
File name:5a616be3a292055d1bfb135bf6ad6ff9be4cd4e8019f819bead20937e2dd96b4
Download: download sample
File size:16'402'198 bytes
First seen:2026-02-04 15:41:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 72c4e339b7af8ab1ed2eb3821c98713a (50 x BlankGrabber, 26 x PythonStealer, 7 x LunaStealer)
ssdeep 393216:Xip6jW83Kq63hucw1+TtIiF4uARuAMdS9QVlNIIKQEM:1W8ab3hrw1QtI1uA8sMl6IKQEM
TLSH T173F6339973A508ECD8AEA17F91E4C25B63A170E703A0928F57F20D520F271E5EE35F52
TrID 64.5% (.EXE) InstallShield setup (43053/19/16)
15.7% (.EXE) Win64 Executable (generic) (10522/11/4)
7.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.0% (.ICL) Windows Icons Library (generic) (2059/9)
3.0% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter Neiki
Tags:exe Python stealer Telegram

Intelligence


File Origin
# of uploads :
1
# of downloads :
237
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
PyInstaller
Details
PyInstaller
a compiled assembly and a Python version
Malware family:
n/a
ID:
1
File name:
svchost.exe
Verdict:
Malicious activity
Analysis date:
2026-02-04 15:30:58 UTC
Tags:
pyinstaller telegram python auto-reg ims-api generic rust evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
ransomware installer extens
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug expand expired-cert fingerprint installer-heuristic keylogger lolbin microsoft_visual_cc overlay packed packed pyinstaller pyinstaller
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-02-04T12:38:00Z UTC
Last seen:
2026-02-04T12:51:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Ransom.Python.Agent.b HEUR:Trojan.Python.Pytr.co HEUR:Trojan-Ransom.Python.Agent.gen
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-02-04 15:31:11 UTC
File Type:
PE+ (Exe)
Extracted files:
1912
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
persistence pyinstaller ransomware
Behaviour
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Drops file in Windows directory
Adds Run key to start application
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Renames multiple (210) files with added filename extension
Unpacked files
SH256 hash:
5a616be3a292055d1bfb135bf6ad6ff9be4cd4e8019f819bead20937e2dd96b4
MD5 hash:
8f8fc7f7442eb1d14acf3593e773463b
SHA1 hash:
e8bff616100ccd9452362f90d0d3f94b860d2bf4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
commented on 2026-02-04 22:25:27 UTC

If someone is affected:

import hashlib, base64, socket, ctypes, uuid
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_backend

def get_key():
hostname = socket.gethostname()
serial = ctypes.c_ulong()
ctypes.windll.kernel32.GetVolumeInformationW(
"C:\\", None, 0, ctypes.byref(serial), None, None, None, 0)
mac = ':'.join(f'{(uuid.getnode()>>i)&0xff:02x}' for i in range(0,48,8))[::-1]
machine_id = hashlib.sha256(f"{hostname}{serial.value}{mac}".encode()).hexdigest()
return hashlib.sha256(machine_id.encode()).digest()

with open(r"C:\Windows\Temp\ds_pwd.enc") as f:
_, iv, ct = f.read().strip().split('|')
cipher = Cipher(algorithms.AES(get_key()), modes.CFB(base64.b64decode(iv)))
print("PASSWORD:", cipher.decryptor().update(base64.b64decode(ct)).decode())

Will print you the Password - also this Malware will not run in Safe Mode. I Reverse-Engineered it.