MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8acfc35ce2d1e0ae44a9a322eccb42f82e8ffa0152ac19695442dca800367844. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 8acfc35ce2d1e0ae44a9a322eccb42f82e8ffa0152ac19695442dca800367844
SHA3-384 hash: 2716999c03d0cb5dc90bcb1cdef491161b9a204c34e184ff39bc04bd44890e6a4f8ee7739c39ede45eaa9fcbcb51983f
SHA1 hash: 4ee2857c80f865c0d1b98299e09ef74d2090a025
MD5 hash: 064b24fe26d0b13ab66aec35042ad5d7
humanhash: oregon-washington-steak-item
File name:atlas_browser.exe
Download: download sample
Signature RustyStealer
File size:89'654'632 bytes
First seen:2025-10-28 16:52:42 UTC
Last seen:2025-11-02 15:12:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 01a702faea615deb8afd2e16c4beb983 (2 x RustyStealer)
ssdeep 1572864:TEy7PX7ibWr0L/k71lMoRB9ktxBpo3MhBGUhXRS4XSJB4Gn0fXt8wrE:Yy+Wr0L/kZzKxBi8hEUhBS4XOl0fXtu
Threatray 1 similar samples on MalwareBazaar
TLSH T167182347F1A612B4C12BC2B593165523EF72B458023A62BE92F887603F87B50D73FB95
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter GDHJDSYDH1
Tags:anti-vm backdoor dropper exe RustyStealer spyware stealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
214
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
atlas_browser.exe
Verdict:
Malicious activity
Analysis date:
2025-10-28 16:43:34 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for synchronization primitives
Creating a file
Сreating synchronization primitives
DNS request
Connection attempt
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm anti-vm evasive fingerprint hacktool invalid-signature keylogger microsoft_visual_cc obfuscated packed packed packer_detected rust signed threat
Verdict:
Clean
File Type:
exe x64
First seen:
2025-10-27T18:49:00Z UTC
Last seen:
2025-10-28T12:21:00Z UTC
Hits:
~10
Gathering data
Verdict:
Malicious
Threat:
NetworkReferences.Malware.Generic
Result
Malware family:
n/a
Score:
  9/10
Tags:
defense_evasion discovery persistence pyinstaller spyware stealer
Behaviour
Checks processor information in registry
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Browser Information Discovery
Detects Pyinstaller
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Looks for VMWare Tools registry key
Enumerates VirtualBox DLL files
Looks for VirtualBox Guest Additions in registry
Looks for VirtualBox executables on disk
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
AuraStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RustyStealer

Executable exe 8acfc35ce2d1e0ae44a9a322eccb42f82e8ffa0152ac19695442dca800367844

(this sample)

Comments