MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8c454525563ef61ee413568f50610c351f29ca2f3e2b1402172384f543c4ee23. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DestinyStealer


Vendor detections: 17


Intelligence 17 IOCs 1 YARA 4 File information Comments

SHA256 hash: 8c454525563ef61ee413568f50610c351f29ca2f3e2b1402172384f543c4ee23
SHA3-384 hash: eb16589f57bab052665e9f1b1149a9ec629bbefd11fd0908674a8ea14dd94f0a07dad6450ccf32fd9bf48c8dbaa891d9
SHA1 hash: 1a2a6ac3e40803981432adbc573ffd7c26ce51e2
MD5 hash: 1d9ead33239ca412509d0eaf0e218e93
humanhash: cold-chicken-spaghetti-avocado
File name:Alter NEW Version 2025.exe
Download: download sample
Signature DestinyStealer
File size:32'164'289 bytes
First seen:2025-09-18 13:41:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4d17be67c8d0394c5c1b8e725359ed89 (5 x Adware.Generic, 4 x njrat, 3 x NanoCore)
ssdeep 786432:M6joOseEKbpj445xSm18wh20fHvdSvTIBDECQq+UrHNm0:tbp7xSmTh2sP4cECYUjNm0
TLSH T13B673393B65CE122E46CF0BF84ADD6BD2B446F1B21D5EA59A7C08E73B8053DB81132D4
TrID 92.7% (.EXE) NSIS - Nullsoft Scriptable Install System (846567/2/133)
3.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
1.1% (.EXE) Win64 Executable (generic) (10522/11/4)
0.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
0.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
Reporter burger
Tags:DestinyStealer exe xworm

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
147.185.221.19:17983 https://threatfox.abuse.ch/ioc/1595044/

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://rebrand.ly/i16zkxb
Verdict:
Malicious activity
Analysis date:
2025-09-18 13:34:34 UTC
Tags:
stealer remote xworm ims-api generic zerotrace api-base64 crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
asyncrat autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Creating a window
Creating a file
Launching a process
Creating a process with a hidden window
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Connection attempt to an infection source
Adding an access-denied ACE
Creating a file in the %AppData% directory
Reading critical registry keys
Changing a file
Launching a service
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Sending a TCP request to an infection source
Stealing user critical data
Forced shutdown of a system process
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
installer microsoft_visual_cc obfuscated overlay packed packer_detected
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-18T10:39:00Z UTC
Last seen:
2025-09-18T10:39:00Z UTC
Hits:
~100
Detections:
Trojan-Dropper.Win32.Dapato.sb Trojan-Banker.MSIL.ClipBanker.sb Trojan-Dropper.Win32.Injector.sb Trojan.MSIL.Crypt.sb Backdoor.MSIL.XWorm.a Trojan.Win32.Miner.a Trojan.PowerShell.Agent.sb Trojan.Miner.HTTP.ServerRequest HEUR:Trojan-PSW.MSIL.Stealer.gen HEUR:Trojan.Win32.Generic HEUR:Backdoor.MSIL.XClient.b Trojan-PSW.Win32.Greedy.sb Trojan-PSW.Win32.Stealer.sb Trojan-Banker.Win32.Express.sb Trojan.Win32.Agent.sb HEUR:Trojan-Ransom.MSIL.Blocker.gen Trojan-PSW.Win32.Coins.sb Backdoor.MSIL.XWorm.b Backdoor.MSIL.VenomRAT.a not-a-virus:PSWTool.MSIL.BroPass.sb PDM:Trojan.Win32.Tasker.cust PDM:Trojan.Win32.Generic Trojan.Agent.UDP.C&C Backdoor.Agent.TCP.C&C VHO:Backdoor.MSIL.XClient.gen
Result
Threat name:
Destiny Stealer, XWorm
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected malicious Powershell script
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to capture screen (.Net source)
Detected generic credential text file
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected BrowsingHistoryView browser history reader tool
Yara detected Destiny Stealer
Yara detected Telegram Recon
Yara detected WebBrowserPassView password recovery tool
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1780059 Sample: Alter NEW Version 2025.exe Startdate: 18/09/2025 Architecture: WINDOWS Score: 100 89 api.telegram.org 2->89 91 copy-victor.gl.at.ply.gg 2->91 103 Suricata IDS alerts for network traffic 2->103 105 Found malware configuration 2->105 107 Malicious sample detected (through community Yara rule) 2->107 111 25 other signatures 2->111 10 Alter NEW Version 2025.exe 11 2->10         started        13 msedge.exe 2->13         started        15 msedge.exe 2->15         started        signatures3 109 Uses the Telegram API (likely for C&C communication) 89->109 process4 file5 79 C:\Users\user\AppData\...\python-3.9.0.exe, PE32 10->79 dropped 81 C:\Users\user\AppData\...\System Settings.exe, PE32 10->81 dropped 83 C:\Users\user\AppData\Local\Temp\Build.exe, PE32 10->83 dropped 17 Build.exe 14 27 10->17         started        22 System Settings.exe 1 5 10->22         started        24 python-3.9.0.exe 3 10->24         started        26 msedge.exe 13->26         started        28 msedge.exe 15->28         started        process6 dnsIp7 85 api.telegram.org 149.154.167.220, 443, 49720 TELEGRAMRU United Kingdom 17->85 63 C:\Users\user\AppData\...\system_info.txt, Algol 17->63 dropped 65 C:\Users\user\AppData\...behaviorgraphetAllPasswords.txt, Unicode 17->65 dropped 67 C:\Users\user\...\ChromeV20Passwords.txt, Unicode 17->67 dropped 69 C:\Users\user\AppData\...\cookieextract.ps1, ASCII 17->69 dropped 113 Antivirus detection for dropped file 17->113 115 Multi AV Scanner detection for dropped file 17->115 117 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 17->117 121 6 other signatures 17->121 30 powershell.exe 17->30         started        34 grpconv.exe 17->34         started        37 grpconv.exe 17->37         started        43 14 other processes 17->43 87 copy-victor.gl.at.ply.gg 147.185.221.19, 17983, 49688 SALSGIVERUS United States 22->87 71 C:\ProgramData\SystemSettings.exe, PE32 22->71 dropped 119 Protects its processes via BreakOnTermination flag 22->119 39 schtasks.exe 22->39         started        73 C:\Windows\Temp\...\python-3.9.0.exe, PE32 24->73 dropped 41 python-3.9.0.exe 12 24->41         started        file8 signatures9 process10 dnsIp11 101 127.0.0.1 unknown unknown 30->101 123 Attempt to bypass Chrome Application-Bound Encryption 30->123 125 Found many strings related to Crypto-Wallets (likely being stolen) 30->125 45 chrome.exe 30->45         started        48 msedge.exe 30->48         started        50 msedge.exe 30->50         started        54 2 other processes 30->54 75 C:\Users\user\AppData\...\places.sqlite-shm, data 34->75 dropped 127 Tries to harvest and steal browser information (history, passwords, etc) 34->127 52 conhost.exe 39->52         started        77 C:\Windows\Temp\...\PythonBA.dll, PE32 41->77 dropped file12 signatures13 process14 dnsIp15 99 192.168.2.6, 138, 17983, 443 unknown unknown 45->99 56 chrome.exe 45->56         started        59 msedge.exe 48->59         started        61 msedge.exe 50->61         started        process16 dnsIp17 93 play.google.com 142.250.189.14, 443, 49712 GOOGLEUS United States 56->93 95 ogads-pa.clients6.google.com 142.251.40.42, 443, 49708, 49711 GOOGLEUS United States 56->95 97 3 other IPs or domains 56->97
Gathering data
Threat name:
ByteCode-MSIL.Backdoor.Ratenjay
Status:
Malicious
First seen:
2025-09-18 13:41:23 UTC
File Type:
PE (Exe)
Extracted files:
11228
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
xworm admintool_bulletpassview admintool_mailpassview admintool_iepassview admintool_extpassword admintool_credentialsfileview zerotracestealer
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:destiny_stealer family:xworm credential_access discovery execution persistence rat stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Uses browser remote debugging
Detected Nirsoft tools
NirSoft WebBrowserPassView
Destiny Stealer
Destiny_stealer family
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
copy-victor.gl.at.ply.gg:17983
Verdict:
Malicious
Tags:
Win.Packed.njRAT-10002074-1
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

DestinyStealer

Executable exe 8c454525563ef61ee413568f50610c351f29ca2f3e2b1402172384f543c4ee23

(this sample)

Comments