MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a3f9c62862d00237c70b4a2dbed05369c98d20356008c2b3f98b47189ec8237d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ScarfaceStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: a3f9c62862d00237c70b4a2dbed05369c98d20356008c2b3f98b47189ec8237d
SHA3-384 hash: 47a8fa6842c2901e964ab2c1dda2d5602b06e11fe6e69e9ffa4927a50dd8fb7565e849b2ccf2edb4d7d76531272e2b3d
SHA1 hash: 3ca11158291bc2d27aac2744ca209c5e17e515fd
MD5 hash: c09af414afebb74d82932e93ce3e475a
humanhash: diet-zulu-fix-charlie
File name:Extreme-Injector.exe
Download: download sample
Signature ScarfaceStealer
File size:13'584'328 bytes
First seen:2026-03-17 20:07:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 90d167456b9fccebb882be2ab5627cd7 (1 x ScarfaceStealer)
ssdeep 393216:E69TBxMb6PpjYTO2adZoCqEA6fvJRawi+OAV0:E8BPpEXUarEHvOGV0
TLSH T107D623E994E022E4D8E38A80778753CEB1E0626E45FD4D2D3AC61C016F21D6F664DDBB
TrID 44.6% (.EXE) Win64 Executable (generic) (6522/11/2)
14.0% (.ICL) Windows Icons Library (generic) (2059/9)
13.8% (.EXE) OS/2 Executable (generic) (2029/13)
13.7% (.EXE) Generic Win/DOS Executable (2002/3)
13.6% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
Reporter burger
Tags:exe ScarfaceStealer signed

Code Signing Certificate

Organisation:Intel Corporation
Issuer:Intel Corporation
Algorithm:sha256WithRSAEncryption
Valid from:2026-03-17T06:12:12Z
Valid to:2029-03-17T06:22:12Z
Serial number: 2923cfe68d00d1ab457d8083cb67e692
Thumbprint Algorithm:SHA256
Thumbprint: 259fdd794e44e729506e99be377ed6fec07b1b8470e897794b6d486f64fe8084
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Extreme-Injector.exe
Verdict:
No threats detected
Analysis date:
2026-03-17 20:06:44 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
54 / 100
Signature
AI detected suspicious PE digital signature
Found direct / indirect Syscall (likely to bypass EDR)
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to evade analysis by execution special instruction (VM detection)
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
a3f9c62862d00237c70b4a2dbed05369c98d20356008c2b3f98b47189ec8237d
MD5 hash:
c09af414afebb74d82932e93ce3e475a
SHA1 hash:
3ca11158291bc2d27aac2744ca209c5e17e515fd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments