MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 626ac4281b5a2bdd8b02429f1c4d595dd04d2c03200e64f9b6537bd2bb7c80fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



WallStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: 626ac4281b5a2bdd8b02429f1c4d595dd04d2c03200e64f9b6537bd2bb7c80fe
SHA3-384 hash: ebe629fb9d176c73caa2a47cbedf994b23565dcaa00687fad00c0a86d82b52de5eb4504588f182b4567c7771a67b4a86
SHA1 hash: 34bedea262a51456d59f88a7c242315f34947e39
MD5 hash: 137f88c1e28511543b696e63f57e0182
humanhash: georgia-alabama-alabama-william
File name:file
Download: download sample
Signature WallStealer
File size:5'264'912 bytes
First seen:2026-04-14 09:22:08 UTC
Last seen:2026-04-14 12:10:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c05cf134dc19034ad65ea00a44098560 (5 x WallStealer)
ssdeep 49152:rLl7vZMSM0VmI2z24jI00zIv53v+TK+Opx+GXOHWn4NKe6f/IlJUusf1DKjmlfUe:tGTdOHlNiglO7VKjAfrlylKeKK+4QL
TLSH T1C636E102E2974ADEC46BC0F8C5112E67F4BE78310A28AB366BD84B646B53B3057FD745
TrID 37.0% (.EXE) Win64 Executable (generic) (6522/11/2)
28.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
11.3% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
dhash icon c492b0f0f0b090c4 (1 x WallStealer)
Reporter Bitsight
Tags:a dropped-by-gcleaner exe MIX3.file WallStealer


Avatar
Bitsight
url: http://158.94.209.95/service

Intelligence


File Origin
# of uploads :
6
# of downloads :
181
Origin country :
US US
Vendor Threat Intelligence
Malware configuration found for:
Wall
Details
Wall
dead-drop resolver urls
Malware family:
n/a
ID:
1
File name:
_626ac4281b5a2bdd8b02429f1c4d595dd04d2c03200e64f9b6537bd2bb7c80fe.exe
Verdict:
Malicious activity
Analysis date:
2026-04-14 09:22:55 UTC
Tags:
stealer wallstealer themida

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
phishing emotet cobalt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Behavior that indicates a threat
DNS request
Connection attempt
Sending a custom TCP request
Connection attempt to an infection source
Sending an HTTP GET request
Query of malicious DNS domain
Sending a TCP request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm base64 crypto evasive fingerprint hacktool lolbin microsoft_visual_cc mikey obfuscated packed packed themidawinlicense wscript
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-04-14T06:31:00Z UTC
Last seen:
2026-04-15T23:51:00Z UTC
Hits:
~100
Detections:
Trojan-PSW.Win32.Vidar.inc Trojan-PSW.Vidar.HTTP.C&C Trojan-PSW.Stealer.TCP.C&C Trojan-PSW.Stealer.HTTP.C&C Trojan-PSW.Lumma.TCP.C&C PDM:Trojan.Win32.Generic
Gathering data
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-04-14 09:22:44 UTC
File Type:
PE+ (Exe)
Extracted files:
7
AV detection:
24 of 38 (63.16%)
Threat level:
  5/5
Result
Malware family:
wall_stealer
Score:
  10/10
Tags:
family:wall_stealer defense_evasion stealer themida trojan
Behaviour
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Checks BIOS information in registry
Themida packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Detects WallStealer stealer
Family: WallStealer
Unpacked files
SH256 hash:
626ac4281b5a2bdd8b02429f1c4d595dd04d2c03200e64f9b6537bd2bb7c80fe
MD5 hash:
137f88c1e28511543b696e63f57e0182
SHA1 hash:
34bedea262a51456d59f88a7c242315f34947e39
Detections:
win_nitrogen_auto
Malware family:
VoidStealer.v2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:pe_detect_tls_callbacks
Rule name:win_nitrogen_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.nitrogen.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

WallStealer

Executable exe 626ac4281b5a2bdd8b02429f1c4d595dd04d2c03200e64f9b6537bd2bb7c80fe

(this sample)

  
Dropped by
Gcleaner
  
Delivery method
Distributed via web download

Comments