MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79add679b6797a46a69d90e7cf40ae91c886e5956602dbb8a4b71dbbf6754379. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SkuldStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 79add679b6797a46a69d90e7cf40ae91c886e5956602dbb8a4b71dbbf6754379
SHA3-384 hash: ef1843e28489cae715120d6ac812c010742a12fa3f7b8e4736161158923020c2f6b69075430134801cd87f9cbd863d45
SHA1 hash: 37b7b857816e101ef1c6db38404fa71493d9ce4d
MD5 hash: a0765b7f130ad93bc3d04e93bfd66265
humanhash: mexico-yankee-echo-aspen
File name:main.exe
Download: download sample
Signature SkuldStealer
File size:3'404'288 bytes
First seen:2025-08-20 07:51:58 UTC
Last seen:2025-08-20 10:21:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6ed4f5f04d62b18d96b26d6db7c18840 (234 x SalatStealer, 78 x BitRAT, 42 x RedLineStealer)
ssdeep 49152:6uFkN8pFLPp9i+n8RTLZTGMhKuHF2FKehaWl9B2GWR2fhVAHHHeQh03tri6Z:nRn3n8R3ZTGgKuHVYaWdEMctyBh
Threatray 21 similar samples on MalwareBazaar
TLSH T189F533B43801DEC4D2BD87B9ADB742F1D5523CD5620DA49C7BFDBA32081C628A85BF25
TrID 63.5% (.EXE) UPX compressed Win64 Executable (70117/5/12)
24.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.8% (.ICL) Windows Icons Library (generic) (2059/9)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter burger
Tags:exe SkuldStealer

Intelligence


File Origin
# of uploads :
4
# of downloads :
50
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://github.com/ddospanels/2pacalypse
Verdict:
Malicious activity
Analysis date:
2025-08-19 17:30:58 UTC
Tags:
github uac skuld evasion stealer discord screenshot arch-doc upx generic ims-api susp-powershell ip-check golang crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
gensteal virus lien sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Enabling the 'hidden' option for analyzed file
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packed packer_detected upx
Result
Threat name:
Go Stealer, Skuld Stealer
Detection:
malicious
Classification:
troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the hosts file
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal communication platform credentials (via file / registry access)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Yara detected Go Stealer
Yara detected Skuld Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1760810 Sample: main.exe Startdate: 20/08/2025 Architecture: WINDOWS Score: 100 45 ip-api.com 2->45 47 discord.com 2->47 49 api.ipify.org 2->49 61 Found malware configuration 2->61 63 Sigma detected: Capture Wi-Fi password 2->63 65 Multi AV Scanner detection for submitted file 2->65 67 11 other signatures 2->67 9 main.exe 2 73 2->9         started        14 SecurityHealthSystray.exe 2->14         started        16 SecurityHealthSystray.exe 2->16         started        signatures3 process4 dnsIp5 51 ip-api.com 208.95.112.1, 49719, 80 TUT-ASUS United States 9->51 53 api.ipify.org 104.26.12.205, 443, 49718 CLOUDFLARENETUS United States 9->53 55 discord.com 162.159.135.232, 443, 49720 CLOUDFLARENETUS United States 9->55 41 C:\Users\user\...\SecurityHealthSystray.exe, PE32+ 9->41 dropped 43 C:\Windows\System32\drivers\etc\hosts, ASCII 9->43 dropped 69 Uses cmd line tools excessively to alter registry or file data 9->69 71 Encrypted powershell cmdline option found 9->71 73 Bypasses PowerShell execution policy 9->73 79 9 other signatures 9->79 18 powershell.exe 23 9->18         started        21 powershell.exe 9->21         started        23 powershell.exe 9->23         started        30 12 other processes 9->30 75 Multi AV Scanner detection for dropped file 14->75 77 Found many strings related to Crypto-Wallets (likely being stolen) 14->77 26 conhost.exe 14->26         started        28 conhost.exe 16->28         started        file6 signatures7 process8 file9 57 Found many strings related to Crypto-Wallets (likely being stolen) 18->57 59 Loading BitLocker PowerShell Module 18->59 39 C:\Users\user\AppData\...\tbk0kutn.cmdline, Unicode 23->39 dropped 32 csc.exe 23->32         started        signatures10 process11 file12 37 C:\Users\user\AppData\Local\...\tbk0kutn.dll, PE32 32->37 dropped 35 cvtres.exe 32->35         started        process13
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.YanismaStealer
Status:
Malicious
First seen:
2025-08-16 05:19:20 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:skuld defense_evasion persistence stealer upx
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
UPX packed file
Adds Run key to start application
Executes dropped EXE
Skuld family
Skuld stealer
Malware Config
C2 Extraction:
https://discord.com/api/webhooks/1405319832684986461/idqc4nQgO-PyemnTfsCtzrqBvaT4r4Z6hlZWbbKYWo_ImEoSVQZlkjXMUjnL_bRfaxyV
Verdict:
Malicious
Tags:
trojan External_IP_Lookup Stealer
YARA:
SUSP_Imphash_Mar23_3
Unpacked files
SH256 hash:
79add679b6797a46a69d90e7cf40ae91c886e5956602dbb8a4b71dbbf6754379
MD5 hash:
a0765b7f130ad93bc3d04e93bfd66265
SHA1 hash:
37b7b857816e101ef1c6db38404fa71493d9ce4d
SH256 hash:
e31bbfe6bfcd4c66382b8886d5f1d9c0578c6b5b086a4ecf48a2fc0b30bd7781
MD5 hash:
adf0aaac5cc14cbaadf5f3052d74b32b
SHA1 hash:
d6aab6b0a155c07b745b79ea0419bdf023d3e1ff
Detections:
INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore INDICATOR_SUSPICIOUS_EXE_DiscordURL INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs INDICATOR_SUSPICIOUS_EXE_SandboxSystemUUIDs INDICATOR_SUSPICIOUS_EXE_Crypto_Wallet_Regex
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:SUSP_Imphash_Mar23_3
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
Reference:Internal Research
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SkuldStealer

Executable exe 79add679b6797a46a69d90e7cf40ae91c886e5956602dbb8a4b71dbbf6754379

(this sample)

  
Delivery method
Distributed via web download

Comments