MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9190f3209cbb11da41e8d4abedb5736f48965a0c02059077776af399f8320ba6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



WallStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 9190f3209cbb11da41e8d4abedb5736f48965a0c02059077776af399f8320ba6
SHA3-384 hash: b009cb98d38fd913fb51b1ba14f169c6f4c52954bccea5db98ce289e895a6b416cc47da9555e5c61ea116af12df6fd85
SHA1 hash: a344446d1ab293c2879787569d2debfd16c7c7b3
MD5 hash: 9498f2d54eee6d36b5ac6e2cf4ef13be
humanhash: emma-montana-item-bacon
File name:HydraCheat7.5.3.exe
Download: download sample
Signature WallStealer
File size:47'353'401 bytes
First seen:2026-03-17 15:55:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 54900ccfb545b5ae7e626203f26ff348 (1 x chr, 1 x WallStealer)
ssdeep 786432:aW4VBwgwID1HkkCO0v1EyTlDepKvdNguSUu4Ki0KN1/+i6rRTjeL8THH3wGNdLXh:0IgwWhyv1Em75S14YM9+1rRTjo8TntNb
TLSH T1EBA7331E6C7409BAEC7ECD3FE4257459CDB9388807BAF60B4209DA732E1BE585C76412
TrID 37.0% (.EXE) Win64 Executable (generic) (6522/11/2)
28.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
11.3% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
Reporter tcains1
Tags:exe WallStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
176
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
HydraCheat7.5.3.exe
Verdict:
Malicious activity
Analysis date:
2026-03-17 15:58:23 UTC
Tags:
websocket stealer wallstealer nodejs

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
phishing trojan shell sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file in the %AppData% subdirectories
Connecting to a non-recommended domain
Connection attempt
Sending an HTTP GET request
Сreating synchronization primitives
Behavior that indicates a threat
DNS request
Sending a custom TCP request
Deleting a recently created file
Adding an exclusion to Microsoft Defender
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm crypto fingerprint microsoft_visual_cc overlay packed
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan-PSW.Stealer.TCP.C&C Trojan-PSW.Stealer.HTTP.C&C Trojan-PSW.Lumma.TCP.C&C PDM:Trojan.Win32.Generic Trojan-PSW.Win32.Vidar.ifk Trojan-PSW.Win32.Vidar.hxs Trojan-PSW.Vidar.HTTP.C&C
Gathering data
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-03-17 15:56:28 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
13 of 22 (59.09%)
Threat level:
  5/5
Result
Malware family:
wall_stealer
Score:
  10/10
Tags:
family:wall_stealer defense_evasion discovery execution persistence spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
Command and Scripting Interpreter: PowerShell
System Time Discovery
Drops file in Windows directory
Obfuscated Files or Information: Command Obfuscation
Executes dropped EXE
Reads user/profile data of web browsers
Registers new Windows logon scripts automatically executed at logon.
Downloads MZ/PE file
Detects WallStealer stealer
WallStealer
Wall_stealer family
Malware family:
WallStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

WallStealer

Executable exe 9190f3209cbb11da41e8d4abedb5736f48965a0c02059077776af399f8320ba6

(this sample)

  
Delivery method
Distributed via web download

Comments