MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aec04267c0e4b298c0c001d5eb450100b022a367816b4b8e2d9d16b2e47665dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ACRStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments 1

SHA256 hash: aec04267c0e4b298c0c001d5eb450100b022a367816b4b8e2d9d16b2e47665dd
SHA3-384 hash: 49b6f0a47e99b7f0cb84af597561a59c3b1d4f927f059ffce2c18d6c559f88bbcc5863c4fb88489583472970dbcabfdc
SHA1 hash: 776113cb7c655331f4d38699148f585ef316e591
MD5 hash: c9a97ddb8b6ad313f60ace3490beaff3
humanhash: finch-lithium-lima-emma
File name:SETUP.zip
Download: download sample
Signature ACRStealer
File size:7'866'325 bytes
First seen:2025-05-18 10:56:40 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 98304:AwlEw+iNrnt7qhJqnE+9BHsNk6/ojPAlW+W9CLfaJXTj+QSDLZ/HGJ2ayaYsWH:Awhz8qnzhsNk6EIlriJDj+QSnZ62qBQ
TLSH T1E186331520930F90D98A12B9C1CB5B8337ACBF8A2242936F9375E73B3FB63B99C11555
Magika zip
Reporter aachum
Tags:ACRStealer file-pumped zip


Avatar
iamaachum
https://ttotemany.blog/?pub_id=321&key=5odZ1peYLhCuTziyWXtaf7SOqwlPFrJIUQ3vcNDMK0s8&site_id=397&data=cY6vrkpFJmalH3wI4 => https://www.mediafire.com/file/ks5e1a4vpvrvp3i/%F0%9D%97%97%F0%9D%97%A2%F0%9D%97%AA@%F0%9D%97%A1%F0%9D%97%9F%F0%9D%97%A2%F0%9D%97%94%F0%9D%97%97$_%F0%9D%97%96%F0%9D%97%A2%F0%9D%97%A0%F0%9D%97%A3%F0%9D%97%9F%F0%9D%97%98%F0%9D%97%A7%F0%9D%97%98%E2%9D%8F%E2%A4%96%F0%9D%97%A6%F0%9D%97%98%F0%9D%97%A7%F0%9D%97%A8%F0%9D%97%A3%E2%9C%B7%F0%9D%97%96%F0%9D%97%A292%F0%9D%97%97%F0%9D%97%98#$$8466.tar/file

Intelligence


File Origin
# of uploads :
1
# of downloads :
407
Origin country :
ES ES
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:setup.exe
Pumped file This file is pumped. MalwareBazaar has de-pumped it.
File size:753'718'594 bytes
SHA256 hash: 6b8a37438c076216a103f18725f9e6b003cb5fbdad255ad66576214d4105cc75
MD5 hash: 4b552dc64e7f46880838fe8b1a5dd01b
De-pumped file size:355'840 bytes (Vs. original size of 753'718'594 bytes)
De-pumped SHA256 hash: d93af51ed0b419e34da902a27bbcad50288cc80746d35a32ceac161cfa9d0858
De-pumped MD5 hash: 20a367fe7f4f1015f60a84701b705b12
MIME type:application/x-dosexec
Signature ACRStealer
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
spawn hype sage
Result
Verdict:
Malicious
File Type:
ZIP File - Malicious
Behaviour
SuspiciousEmbeddedObjects detected
Gathering data
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2025-05-18 10:57:12 UTC
File Type:
Binary (Archive)
Extracted files:
4758
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ACRStealer

zip aec04267c0e4b298c0c001d5eb450100b022a367816b4b8e2d9d16b2e47665dd

(this sample)

Comments



Avatar
commented on 2025-05-18 11:01:26 UTC

Wrong link. Should be https://zasdxcvfdsxccdff.click/?fR95wo6q4pQnEuY8OLBilJMTxvgAZ0t3X7HCFDaz=slT2YPOgD6kVrBURGIhvzMK1a47e9WEpmJ0CqFuojiS=7XYh0MgSuaBOyWQxwmG1JdfvDIkNUKLbqFV8rzAes52RoHP&p_title=xdGDvwhQpkFmVYrP7LZ3tiIW8f5 => https://mega.nz/file/wFYRRbxY#4JpjTkXmBToVZqp9kY_krpwZY9tMSZUsFaUoeCvNFd0