MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c482ed8263d1e7e7ba62b63bd5baf133efb8b25231d3bf501f149cea2ba3e94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: 5c482ed8263d1e7e7ba62b63bd5baf133efb8b25231d3bf501f149cea2ba3e94
SHA3-384 hash: 6c5c0a5de5851d393a197d6bc082f3449858d6ba686ba11dda91f8708164eb99d86c96f8598d9483450030218a381fb2
SHA1 hash: 514b0ed28b179387b694bc076c26491d38772ea1
MD5 hash: b9aa188b0522b5b675f3cf32a777a6fe
humanhash: network-south-nine-sierra
File name:setup.exe
Download: download sample
File size:75'776 bytes
First seen:2025-08-30 14:51:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5389e90dc96a9ad8822d63603b28ceed
ssdeep 1536:CAJpAtKijO1KcPfPOqj7QMY5rYgj58+IEp:lajUPOqodj58+V
TLSH T1F7731A233BD2C236E19512B96D74EEF942BFF9304B6553D3B3C49B1A88142E26C31E46
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
54
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup.exe
Verdict:
No threats detected
Analysis date:
2025-08-30 14:54:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
downloader dropper
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Reading critical registry keys
DNS request
Creating a file in the %AppData% directory
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
microsoft_visual_cc obfuscated
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-08-30T02:38:00Z UTC
Last seen:
2025-08-30T02:38:00Z UTC
Hits:
~100
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Spyware.Negasteal
Status:
Suspicious
First seen:
2025-08-30 14:55:46 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
17 of 24 (70.83%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Location Discovery: System Language Discovery
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
5c482ed8263d1e7e7ba62b63bd5baf133efb8b25231d3bf501f149cea2ba3e94
MD5 hash:
b9aa188b0522b5b675f3cf32a777a6fe
SHA1 hash:
514b0ed28b179387b694bc076c26491d38772ea1
Malware family:
EddieStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe 5c482ed8263d1e7e7ba62b63bd5baf133efb8b25231d3bf501f149cea2ba3e94

(this sample)

  
Delivery method
Distributed via web download

Comments