MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 82a3ba5caa5b2485aae01a593f7ab4a3068d6b7ca367743fff8c6f0e8e81ae69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ACRStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 5 File information Comments

SHA256 hash: 82a3ba5caa5b2485aae01a593f7ab4a3068d6b7ca367743fff8c6f0e8e81ae69
SHA3-384 hash: f329ef001b9f179ec201f73121592b5bd9b37a2120d2c93b373b339c679839a5808b74207f00c93be19b341aaf885283
SHA1 hash: abd5a35314b3cb85dc5518a0873f9df048f0aa2b
MD5 hash: 7a6a9d3b3500f46b6393be63e79016f7
humanhash: nebraska-hawaii-beer-ten
File name:Setup.exe
Download: download sample
Signature ACRStealer
File size:12'270'116 bytes
First seen:2026-05-01 15:21:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f571ce9fba23794d1a3909f0c99bb208 (1 x ACRStealer)
ssdeep 196608:itVLHm4/hOEj58JZVkwvo9oHm4/hOEj58JZVkwvovoHm4/hOEj58JZVkwvo4:sVb5ZOEtUQO5ZOEtUQY5ZOEtUQ4
TLSH T1D1C6338C34ACD432ED330BB62AB17AA8A67A62560B2F39DB3760457D4F354C5D530B4B
TrID 22.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win64 Executable (generic) (6522/11/2)
17.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.7% (.EXE) Win32 Executable (generic) (4504/4/1)
7.0% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon b8cec6a6a383eeaa (1 x ACRStealer)
Reporter aachum
Tags:ACRStealer exe turbine-grandauto-cfd


Avatar
iamaachum
https://file2cloudx.cfd/ => https://www.mediafire.com/file/x9udz1nk4umiiz6/D0WNL0AD_SETUP_FILE_(KEY_1061).zip/file

ACRStealer C2: turbine.grandauto.cfd

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
ES ES
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
exe
Verdict:
Malicious activity
Analysis date:
2026-05-01 15:24:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug crypto evasive fingerprint installer-heuristic invalid-signature keylogger microsoft_visual_cc overlay packed packed signed
Verdict:
Clean
File Type:
exe x32
First seen:
2026-04-30T23:11:00Z UTC
Last seen:
2026-05-03T00:19:00Z UTC
Hits:
~100
Result
Threat name:
NetSupport RAT, EtherHiding
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to hide a thread from the debugger
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Early bird code injection technique detected
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal from password manager
Unusual module load detection (module proxying)
Writes to foreign memory regions
Yara detected EtherHiding
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1907347 Sample: Setup.exe Startdate: 01/05/2026 Architecture: WINDOWS Score: 100 51 turbine.grandauto.cfd 2->51 53 sp1.gstats-api-coni.co 2->53 55 25 other IPs or domains 2->55 79 Suricata IDS alerts for network traffic 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 Yara detected EtherHiding 2->83 85 2 other signatures 2->85 8 Setup.exe 1 2->8         started        12 ngep.exe 2->12         started        14 ngep.exe 2->14         started        16 capwind.exe 2->16         started        signatures3 process4 dnsIp5 75 turbine.grandauto.cfd 104.21.80.49, 443, 49692 CLOUDFLARENETUS United States 8->75 77 ootip.submergejunkie.life 172.67.182.59, 443, 49694 CLOUDFLARENETUS United States 8->77 97 Detected unpacking (changes PE section rights) 8->97 99 Early bird code injection technique detected 8->99 101 Found many strings related to Crypto-Wallets (likely being stolen) 8->101 103 13 other signatures 8->103 18 dllhost.exe 17 24 8->18         started        23 powershell.exe 14 16 8->23         started        25 chrome.exe 8->25         started        27 WerFault.exe 21 12->27         started        29 WerFault.exe 12->29         started        31 WerFault.exe 21 14->31         started        33 WerFault.exe 14->33         started        signatures6 process7 dnsIp8 57 part-0012.t-0009.t-msedge.net 13.107.246.40, 443, 49690, 49707 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->57 59 download2333.mediafire.com 199.91.155.74, 443, 49700 MEDIAFIREUS United States 18->59 65 8 other IPs or domains 18->65 43 C:\Users\user\AppData\Roaming\...\ngep.exe, PE32+ 18->43 dropped 45 C:\Users\user\AppData\...\vcruntime140_1.dll, PE32+ 18->45 dropped 47 C:\Users\user\AppData\...\vcruntime140.dll, PE32+ 18->47 dropped 49 12 other files (none is malicious) 18->49 dropped 87 Unusual module load detection (module proxying) 18->87 35 ngep.exe 12 18->35         started        61 13.107.213.40, 443, 49693, 49733 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 23->61 63 140.82.114.5, 443, 49732, 49736 GITHUBUS United States 23->63 67 2 other IPs or domains 23->67 89 Found suspicious powershell code related to unpacking or dynamic code loading 23->89 39 capwind.exe 23->39         started        41 conhost.exe 23->41         started        file9 signatures10 process11 dnsIp12 69 sp1.gstats-api-coni.co 104.21.30.96, 443, 49710 CLOUDFLARENETUS United States 35->69 71 k8s-ingressn-bscmainn-3f9a19480b-888004326.us-east-1.elb.amazonaws.com 34.196.28.60, 443, 49709 AMAZON-AESUS United States 35->71 91 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 35->91 93 Unusual module load detection (module proxying) 35->93 95 Found direct / indirect Syscall (likely to bypass EDR) 35->95 73 194.113.235.125, 443, 49750 GALAXYDATARU Russian Federation 39->73 signatures13
Gathering data
Threat name:
Win32.Infostealer.Vipgsm
Status:
Suspicious
First seen:
2026-05-01 11:12:14 UTC
File Type:
PE (Exe)
Extracted files:
13
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
unc_loader_053
Similar samples:
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery persistence spyware stealer
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
82a3ba5caa5b2485aae01a593f7ab4a3068d6b7ca367743fff8c6f0e8e81ae69
MD5 hash:
7a6a9d3b3500f46b6393be63e79016f7
SHA1 hash:
abd5a35314b3cb85dc5518a0873f9df048f0aa2b
SH256 hash:
56ead3004d45bb3b06940dfbd255afc3ef3a40bcdf9bcc157f88cff9856d3d84
MD5 hash:
bc4f4d4a7a28ebb28a7a9406d11751c5
SHA1 hash:
ffbee7ef2fccbd8fc692200d40ad096f7241b2dd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_B64_Encoded_UserAgent
Author:ditekSHen
Description:Detects executables containing base64 encoded User Agent
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ACRStealer

Executable exe 82a3ba5caa5b2485aae01a593f7ab4a3068d6b7ca367743fff8c6f0e8e81ae69

(this sample)

  
Delivery method
Distributed via web download

Comments