MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9fdf4415759c6535a3e7464458954143a7e0bfee97eadcfcf3d635a90caa202f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



LinaStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 9fdf4415759c6535a3e7464458954143a7e0bfee97eadcfcf3d635a90caa202f
SHA3-384 hash: ace78a42b209d9ea85ace7f6b10754e2f32f08c0a7f16a2c42bb7531bcfa2347934783bba2d054bc678eb5df92c76c48
SHA1 hash: bc49e95a152aebb6c1ef908712cd3f2824533510
MD5 hash: b03c54333efa373775fdc5ad8c69f886
humanhash: oscar-michigan-football-bacon
File name:Error404 Setup 1.0.0 (3).exe
Download: download sample
Signature LinaStealer
File size:95'058'558 bytes
First seen:2025-12-04 13:43:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (542 x GuLoader, 116 x RemcosRAT, 80 x EpsilonStealer)
ssdeep 1572864:TYoAO73e+mm8f43pJWKcujMoN37jxUDOsWWyP07vYqu4R92PupWHCQ8:Top+rK47/cGt9oWWyP0jSP+q8
TLSH T14128332590368407E2A439F8AD72C27113F11FAB948065ED61E6BFF3F26D10867F87A5
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter ragnarok10006
Tags:exe infostealer Linastealer stealer


Avatar
ragnarok10006
new skid malware https://linahook.com

Intelligence


File Origin
# of uploads :
1
# of downloads :
37
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
shell sage blic
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole fingerprint installer installer installer-heuristic microsoft_visual_cc nsis overlay packed
Gathering data
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion discovery execution spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Enumerates processes with tasklist
Checks installed software on the system
Obfuscated Files or Information: Command Obfuscation
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropping
LinaStealer
  
Delivery method
Other

Comments