MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aab194f10b0bf13879177d42e353d4f6e82dd61e530a26dd9b3727d31c0263af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SharkStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: aab194f10b0bf13879177d42e353d4f6e82dd61e530a26dd9b3727d31c0263af
SHA3-384 hash: 79d5bbb35c6c51a094c9b6b8db318b7909aa317b02c9aff68afdd2d935b5acd3c6aa2e23a9988d72c928a558154f25ef
SHA1 hash: 861c3a0739d0d67c83b74a6ea55e09e2e1305aab
MD5 hash: dbd642943be9b856d809886a91e96a92
humanhash: quiet-seventeen-pip-mike
File name:01MHHVYFRM.msi
Download: download sample
Signature SharkStealer
File size:12'513'280 bytes
First seen:2025-09-17 18:20:06 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 196608:iDr9qZg4sJKdsLBMRjxenL/YqmHZZEXERGtGMO8VZFBdm/nBPjW6:inkZ2JKdsLKtgLAqmHZZkE8tH5VZFybP
Threatray 44 similar samples on MalwareBazaar
TLSH T1A1C633A298624713EC8B17B2615BB09DA2014E10727C79519BCB7F0926F6F72EE3137D
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter aachum
Tags:91-242-163-152 dropped-by-ACRStealer HIjackLoader msi SharkStealer signed

Code Signing Certificate

Organisation:Gen Digital Inc
Issuer:Gen Digital Inc
Algorithm:sha1WithRSA
Valid from:2018-12-31T23:00:00Z
Valid to:2098-12-31T23:00:00Z
Serial number: 551dbfe32f39d5ae463d7dc84d0f3d78
Thumbprint Algorithm:SHA256
Thumbprint: 6b83edc21d9616f84282eb8bf9b385056ad2bcc1e934dad9de638ad66a900e96
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
iamaachum
http://mi.raisindispose.com/kaWt2QXfpPueNM/F.ct/01MHHVYFRM.msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
45
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug crypto expired-cert fingerprint installer short-lived-cert signed wix
Verdict:
Malicious
File Type:
msi
First seen:
2025-09-17T15:38:00Z UTC
Last seen:
2025-09-17T15:38:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Inject.sb Trojan.Win32.Strab.sb Trojan.Win32.Penguish.sb HEUR:Trojan.OLE2.Alien.gen
Result
Threat name:
HijackLoader
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Antivirus detection for dropped file
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected HijackLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1779497 Sample: 01MHHVYFRM.msi Startdate: 17/09/2025 Architecture: WINDOWS Score: 88 38 x.ss2.us 2->38 40 data-seed-prebsc-2-s1.binance.org 2->40 42 2 other IPs or domains 2->42 58 Found malware configuration 2->58 60 Antivirus detection for dropped file 2->60 62 Yara detected HijackLoader 2->62 8 msiexec.exe 78 38 2->8         started        11 aq.exe 2->11         started        14 msiexec.exe 3 2->14         started        signatures3 process4 file5 34 C:\Users\user\AppData\Local\...\cmdres.dll, PE32+ 8->34 dropped 36 C:\Users\user\AppData\Local\...\aq.exe, PE32+ 8->36 dropped 16 aq.exe 12 8->16         started        68 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->68 signatures6 process7 file8 26 C:\Users\user\...26ortonBrowserProtect.exe, PE32 16->26 dropped 28 C:\Users\user\AppData\Local\...\6DC5828.tmp, PE32 16->28 dropped 30 C:\ProgramData\ArmouryDevice\cmdres.DLL, PE32+ 16->30 dropped 32 C:\ProgramData\ArmouryDevice\Chime.exe, PE32 16->32 dropped 50 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 16->50 52 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->52 54 Found hidden mapped module (file has been removed from disk) 16->54 56 2 other signatures 16->56 20 NortonBrowserProtect.exe 1 5 16->20         started        24 Chime.exe 1 16->24         started        signatures9 process10 dnsIp11 44 91.242.163.152, 1477, 49698, 49700 OOO-SYSMEDIA-ASRU Russian Federation 20->44 46 a8a00b7a27dd309f6.awsglobalaccelerator.com 3.33.196.84, 49695, 8545 AMAZONEXPANSIONGB United States 20->46 48 2 other IPs or domains 20->48 64 Switches to a custom stack to bypass stack traces 20->64 66 Found direct / indirect Syscall (likely to bypass EDR) 20->66 signatures12
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
CAB:COMPRESSION:LZX Executable Office Document PDB Path PE (Portable Executable) PE File Layout PE Memory-Mapped (Dump)
Result
Malware family:
shark_stealer
Score:
  10/10
Tags:
family:hijackloader family:shark_stealer defense_evasion discovery loader persistence privilege_escalation ransomware spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Badlisted process makes network request
Enumerates connected drives
Detects HijackLoader (aka IDAT Loader)
Detects SharkStealer payload
HijackLoader
Hijackloader family
SharkStealer
Shark_stealer family
Malware family:
IDATLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SharkStealer

Microsoft Software Installer (MSI) msi aab194f10b0bf13879177d42e353d4f6e82dd61e530a26dd9b3727d31c0263af

(this sample)

  
Dropped by
ACRStealer
  
Delivery method
Distributed via web download

Comments