MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7cc9673598993d033f68cf3c19e12078f22ce35d5fcedebe9cd5e8f4d4d6cb8d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SalatStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: 7cc9673598993d033f68cf3c19e12078f22ce35d5fcedebe9cd5e8f4d4d6cb8d
SHA3-384 hash: dafdbdff21bbb830661c949512502848964b746f6e5d53ff24dc99a1789a22708d8b2ab7a20023a363864fc5ab15e76b
SHA1 hash: 3ef7c41622de1b643422e075852a6dc84a0c49d2
MD5 hash: 44370ce67f729ba3d43507e7a22e05b3
humanhash: table-alpha-monkey-bakerloo
File name:44370ce67f729ba3d43507e7a22e05b3.exe
Download: download sample
Signature SalatStealer
File size:6'928'896 bytes
First seen:2025-08-16 13:43:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'842 x AgentTesla, 19'774 x Formbook, 12'296 x SnakeKeylogger)
ssdeep 196608:THj1s9jPCy9nS6i5wTdKZ/U0fLTOAFnvG3kwS:TD1sdPF9nS6uaZoTOAF+x
TLSH T13E6633AF03C1A8CAF994B476E652624937EEF06F45B25823D9467CB6D01306CC1B5F3A
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 65da5a5a9a7a621d (1 x SalatStealer)
Reporter abuse_ch
Tags:exe SalatStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
60
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
44370ce67f729ba3d43507e7a22e05b3.exe
Verdict:
Malicious activity
Analysis date:
2025-08-16 13:47:45 UTC
Tags:
evasion upx susp-powershell stealer golang salatstealer ms-smartcard github

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect dropper virus msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Running batch commands
Launching a process
Creating a window
Sending a UDP request
Sending a custom TCP request
Creating a file in the Program Files subdirectories
Enabling the 'hidden' option for recently created files
Searching for synchronization primitives
Launching a service
Creating a process with a hidden window
Loading a system driver
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm anti-vm fingerprint obfuscated packed packed packer_detected vbnet
Result
Threat name:
Salat Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates multiple autostart registry keys
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Powershell download and execute
Yara detected Salat Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1758362 Sample: JZS6r0IKhk.exe Startdate: 16/08/2025 Architecture: WINDOWS Score: 100 70 release-assets.githubusercontent.com 2->70 72 keyauth.win 2->72 74 3 other IPs or domains 2->74 94 Suricata IDS alerts for network traffic 2->94 96 Antivirus detection for dropped file 2->96 98 Antivirus / Scanner detection for submitted sample 2->98 100 7 other signatures 2->100 9 JZS6r0IKhk.exe 14 6 2->9         started        14 4d49Rab88GrmAG4IOwrdh.exe 15 1 2->14         started        16 750feGtZUqFa89H.exe 2->16         started        18 2 other processes 2->18 signatures3 process4 dnsIp5 88 ip-api.com 208.95.112.1, 49717, 80 TUT-ASUS United States 9->88 64 C:\Users\user\AppData\Local\Temp\System.exe, PE32 9->64 dropped 66 C:\Users\user\AppData\Local\Temp\LoAdEr.exe, PE32+ 9->66 dropped 68 C:\Users\user\AppData\...\JZS6r0IKhk.exe.log, CSV 9->68 dropped 116 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 9->116 20 System.exe 3 7 9->20         started        25 LoAdEr.exe 9->25         started        90 8.8.4.4, 443, 60621 GOOGLEUS United States 14->90 92 104.21.80.1, 443, 60623 CLOUDFLARENETUS United States 14->92 118 Found many strings related to Crypto-Wallets (likely being stolen) 14->118 120 Tries to harvest and steal browser information (history, passwords, etc) 14->120 122 Tries to steal Crypto Currency Wallets 14->122 27 powershell.exe 14->27         started        file6 signatures7 process8 dnsIp9 76 dns.google 8.8.8.8, 443, 49327, 51233 GOOGLEUS United States 20->76 78 104.21.32.1, 443, 49328 CLOUDFLARENETUS United States 20->78 50 C:\Users\user\...\ShellExperienceHost.exe, PE32 20->50 dropped 52 C:\...\4d49Rab88GrmAG4IOwrdh.exe, PE32 20->52 dropped 54 C:\...\750feGtZUqFa89H.exe, PE32 20->54 dropped 102 Antivirus detection for dropped file 20->102 104 Multi AV Scanner detection for dropped file 20->104 106 Found many strings related to Crypto-Wallets (likely being stolen) 20->106 108 Creates multiple autostart registry keys 20->108 29 ShellExperienceHost.exe 20->29         started        80 keyauth.win 104.26.0.5, 443, 49724 CLOUDFLARENETUS United States 25->80 82 127.0.0.1 unknown unknown 25->82 110 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 25->110 32 cmd.exe 1 25->32         started        34 WerFault.exe 19 16 25->34         started        84 github.com 140.82.112.3, 443, 49745 GITHUBUS United States 27->84 86 release-assets.githubusercontent.com 185.199.108.133, 443, 49746 FASTLYUS Netherlands 27->86 56 C:\Users\user\AppData\Local\Temp\ffmpeg.exe, PE32+ 27->56 dropped 58 C:\Users\user\AppData\Local\...\MSTSCLib.dll, PE32 27->58 dropped 60 C:\Users\user\AppData\...\AxMSTSCLib.dll, PE32 27->60 dropped 62 2 other malicious files 27->62 dropped 112 Loading BitLocker PowerShell Module 27->112 114 Powershell drops PE file 27->114 36 conhost.exe 27->36         started        38 WmiPrvSE.exe 27->38         started        40 ReAgentc.exe 27->40         started        file10 signatures11 process12 signatures13 124 Antivirus detection for dropped file 29->124 126 Multi AV Scanner detection for dropped file 29->126 42 conhost.exe 32->42         started        44 certutil.exe 3 1 32->44         started        46 find.exe 1 32->46         started        48 find.exe 1 32->48         started        process14
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.22 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Trojan.XWormRAT
Status:
Malicious
First seen:
2025-08-11 20:37:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
scavenger
Similar samples:
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Looks up external IP address via web service
Verdict:
Malicious
Tags:
Win.Packed.Msilzilla-10008147-0
YARA:
n/a
Unpacked files
SH256 hash:
7cc9673598993d033f68cf3c19e12078f22ce35d5fcedebe9cd5e8f4d4d6cb8d
MD5 hash:
44370ce67f729ba3d43507e7a22e05b3
SHA1 hash:
3ef7c41622de1b643422e075852a6dc84a0c49d2
SH256 hash:
1a018595e4131201823538a6b8b08bd3a24307d6bfca89bb2e2d404c243ebef6
MD5 hash:
0c1aa191f6de977878031d047cac5192
SHA1 hash:
e62ec8215ea0c26c73bfee04c08c05bd29cfcd82
Detections:
INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
SH256 hash:
2a7bd8981fc2ccd677e70958fbd1811ec67baec768487cdc773698af53abaf66
MD5 hash:
46d350c67b2604f78c7ddde4d99b2b73
SHA1 hash:
0a2d750b1614fa98fba9070dd09fbf375cbebe5d
SH256 hash:
5959a44bf1127b751432999db116c0e7ca5d86f0ae2738abc955fada85a121b3
MD5 hash:
288c5e3fc638d9af28fb3bdea1439ec2
SHA1 hash:
4b9a4788355c9f6b1dd1e298d8e6b738a0d06cad
Malware family:
SalatStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments