MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b9f0a47f0e1ed11995b18ca0eec65c53c8e027076fa8be151271b6f0b110276. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SalatStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 5 File information Comments

SHA256 hash: 9b9f0a47f0e1ed11995b18ca0eec65c53c8e027076fa8be151271b6f0b110276
SHA3-384 hash: 3b889ac8889cf3158d115305c0d855ed1ab87a8fcf890d763268a77764fe7968778ac5185c376fe7cb23f49f6eb12042
SHA1 hash: 66e24e68708bf22513d29d21a1fe2e3e0787bba1
MD5 hash: f91ffe77a188a2eff4b76185283ccc4b
humanhash: one-gee-chicken-juliet
File name:Xeno.exe
Download: download sample
Signature SalatStealer
File size:323'584 bytes
First seen:2026-03-17 01:21:50 UTC
Last seen:2026-03-17 02:33:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4ecb61cf42f072b5a9bd97df53ffdff3 (1 x SalatStealer)
ssdeep 6144:9dQMzyjV5W0bfXJ2u9YTssOpl42AngbpLJNJY8aFBT:XnzyjR/39Yl
Threatray 225 similar samples on MalwareBazaar
TLSH T169647D26F7A414F9E867D27CC9524906EB72BC4347A1EBDF03900A962F276D09D3EB11
TrID 37.0% (.EXE) Win64 Executable (generic) (6522/11/2)
28.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
11.3% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
Reporter user35335
Tags:exe SalatStealer


Avatar
user35335
https://www.youtube.com/watch?v=g_yQolLcJN8 -> https://graph.org/Roblox-Executor-XENO-03-16 -> https://www.dropbox.com/transfer/AAAAANokZfA5tBSu95rq5rTEzIXL2ZhsNGxtbGxa0LQ4fHSSwno0gYk

Intelligence


File Origin
# of uploads :
2
# of downloads :
181
Origin country :
CA CA
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
https://www.dropbox.com/transfer/AAAAANokZfA5tBSu95rq5rTEzIXL2ZhsNGxtbGxa0LQ4fHSSwno0gYk
Verdict:
Malicious activity
Analysis date:
2026-03-17 01:04:19 UTC
Tags:
salatstealer stealer upx susp-powershell golang ms-smartcard

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
dropper shell crypt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a window
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file
Creating a process with a hidden window
Moving a recently created file
Creating a process from a recently created file
Сreating synchronization primitives
Sending a UDP request
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% directory
Launching a process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint microsoft_visual_cc
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan-PSW.Win64.Salat.sb Trojan-PSW.Win32.Stealer.sb Trojan-PSW.Win32.Coins.sb Trojan.Win64.Agent.sb PDM:Trojan.Win32.Generic Trojan-Dropper.Win32.Dapato.sb Trojan.Win32.Snojan.dbjd Trojan.Win32.Agent.sba Trojan.Snojan.HTTP.Download
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Result
Malware family:
salatstealer
Score:
  10/10
Tags:
family:salatstealer credential_access discovery execution persistence spyware stealer upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Executes dropped EXE
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Command and Scripting Interpreter: PowerShell
Detect SalatStealer payload
Salatstealer family
salatstealer
Unpacked files
SH256 hash:
9b9f0a47f0e1ed11995b18ca0eec65c53c8e027076fa8be151271b6f0b110276
MD5 hash:
f91ffe77a188a2eff4b76185283ccc4b
SHA1 hash:
66e24e68708bf22513d29d21a1fe2e3e0787bba1
Malware family:
SalatStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SalatStealer

Executable exe 9b9f0a47f0e1ed11995b18ca0eec65c53c8e027076fa8be151271b6f0b110276

(this sample)

  
Delivery method
Distributed via web download

Comments