MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 88c77b1fa9d509cdbf01a711bebeea2f2bd4f2652991b9a6a5ac583a8a5f405b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 19


Intelligence 19 IOCs YARA 4 File information Comments

SHA256 hash: 88c77b1fa9d509cdbf01a711bebeea2f2bd4f2652991b9a6a5ac583a8a5f405b
SHA3-384 hash: 3fbc1cb160f1ca93220d38198546af7844b4039a002db982e49f3f64b59fa2e00c493e1d8759e9375b6c46b64ee0a3d4
SHA1 hash: 44fbedb75230b82a893aab245ddb7989e1f746a7
MD5 hash: 4554ebe63cd183c9954f8506f90d68c2
humanhash: moon-sodium-south-orange
File name:Payment_Advice.exe
Download: download sample
Signature Arechclient2
File size:733'696 bytes
First seen:2025-09-16 06:14:02 UTC
Last seen:2025-09-16 06:14:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:SpxBVn0V6gtShqZjxy4SHt1gY5ZX+yNHRb8R2E8xEqFxSYiLxgir:SPB5y6ymqZ8VHQ2ZX+aHRTREqFxgLtr
TLSH T105F4BD17765D9B8EE3A95BB035B1C3B00268AFE76810D941BDE7ED6F30B164C28172D2
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter lowmal3
Tags:Arechclient2 exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
86
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Payment_Advice.exe
Verdict:
Malicious activity
Analysis date:
2025-09-16 06:16:48 UTC
Tags:
stealer redline lefthook metastealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
infosteal redline
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 bitmap formbook krypt lolbin masquerade msbuild obfuscated packed packed reconnaissance redline redline regsvcs rezer0 roboski schtasks stealer stego unsafe vbc vbnet windows
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-16T00:15:00Z UTC
Last seen:
2025-09-16T00:15:00Z UTC
Hits:
~100
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Silenttrinity Stager Msbuild Activity
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.25 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Malicious
First seen:
2025-09-16 04:12:26 UTC
File Type:
PE (.Net Exe)
Extracted files:
25
AV detection:
27 of 38 (71.05%)
Threat level:
  2/5
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:redline family:sectoprat botnet:cheat discovery infostealer rat spyware trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
RedLine
RedLine payload
Redline family
SectopRAT
SectopRAT payload
Sectoprat family
Malware Config
C2 Extraction:
103.28.70.171:5635
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
88c77b1fa9d509cdbf01a711bebeea2f2bd4f2652991b9a6a5ac583a8a5f405b
MD5 hash:
4554ebe63cd183c9954f8506f90d68c2
SHA1 hash:
44fbedb75230b82a893aab245ddb7989e1f746a7
SH256 hash:
1041b538ccbc7d66e59247ef7551cde9b6c282843541585e9190a8e2e3943b12
MD5 hash:
e870d1e8f3791ccc141f85f40fd2972b
SHA1 hash:
150919ee289cffa6feb40ab8261f620dd7e26aac
SH256 hash:
c1f9d9a535b7c50557e0b3b8e4659dabff94320b42b98fb85b237f386fa481ee
MD5 hash:
2c2f42ef5ac03b963933f4a63ac7d9aa
SHA1 hash:
3c6bc081cd5b4f0f08f534e7133df9e9d15c567c
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
844e4c466954278d395f6e8a14f0dce60052f683ea921e147fc756abba4c82a5
MD5 hash:
242fe0e346c853ca08cbbb9edb5afb3c
SHA1 hash:
3dfdc3fd5a6355ad13f0dba01d8f4aa30774214c
Detections:
RedLine_a INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs MALWARE_Win_RedLine
Malware family:
SectopRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Arechclient2

Executable exe 88c77b1fa9d509cdbf01a711bebeea2f2bd4f2652991b9a6a5ac583a8a5f405b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments