MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b3a49ed46957bea9b6fa46b6f67445bc6e8885ae200c811a4b038d939b369aac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DestinyStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 20 File information Comments

SHA256 hash: b3a49ed46957bea9b6fa46b6f67445bc6e8885ae200c811a4b038d939b369aac
SHA3-384 hash: 8f899a45a6f1bc20226188164cbb65aa01241e55a74357783b0cc60f24833430624562e7accc7499b6ec3ec2007032d3
SHA1 hash: 672d96a261ebbe542ee9772647713bde95242380
MD5 hash: e012a3a91194c52eaa1a52806ee08674
humanhash: lactose-sink-lion-sodium
File name:ZjzKL2r.exe
Download: download sample
Signature DestinyStealer
File size:12'950'528 bytes
First seen:2025-09-07 16:47:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 393216:U4fTYzcEwVNZHSzJlxfgBy5ZBjl4ObMGTVMC1x4ITOugKDIe8SLJyX:U+mcLVDHSlbfgBy5h4OwGFT/ceF1yX
TLSH T167D6FBB46D37E0BD6A7DB080CE9B710E8D9A9722826450F70AED17486738DD6B407E73
TrID 52.9% (.EXE) Win32 Executable (generic) (4504/4/1)
23.5% (.EXE) Generic Win/DOS Executable (2002/3)
23.5% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:DestinyStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b3a49ed46957bea9b6fa46b6f67445bc6e8885ae200c811a4b038d939b369aac.exe
Verdict:
Malicious activity
Analysis date:
2025-09-06 15:02:12 UTC
Tags:
stealer themida api-base64 zerotrace arch-doc arch-html

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
shell spawn sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for analyzing tools
Enabling the 'hidden' option for analyzed file
Using the Windows Management Instrumentation requests
Launching a process
Adding an access-denied ACE
Creating a file in the %temp% directory
Creating a file in the %AppData% directory
Reading critical registry keys
Changing a file
Launching a service
Creating a file
Creating a window
Creating a process from a recently created file
Creating a process with a hidden window
Forced shutdown of a system process
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed packed themidawinlicense
Verdict:
Malicious
Labled as:
Suspicious:Packed.NSAnti.b.flgf
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-06T12:12:00Z UTC
Last seen:
2025-09-06T12:12:00Z UTC
Hits:
~10
Detections:
Trojan.PowerShell.Agent.sb Backdoor.Win32.Phpw.fbc Trojan-PSW.Win32.Stealer.sb Trojan-PSW.Win32.Coins.sb Trojan-Dropper.Win32.Dapato.sb Trojan.MSIL.Crypt.sb Trojan.Win32.Miner.a Trojan.Miner.HTTP.ServerRequest HEUR:Backdoor.Win32.Generic not-a-virus:PSWTool.MSIL.BroPass.sb
Result
Threat name:
Destiny Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
AI detected malicious Powershell script
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
Detected unpacking (changes PE section rights)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected BrowsingHistoryView browser history reader tool
Yara detected Destiny Stealer
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1772691 Sample: ZjzKL2r.exe Startdate: 07/09/2025 Architecture: WINDOWS Score: 100 78 Malicious sample detected (through community Yara rule) 2->78 80 Antivirus / Scanner detection for submitted sample 2->80 82 Multi AV Scanner detection for submitted file 2->82 84 9 other signatures 2->84 8 ZjzKL2r.exe 26 2->8         started        13 msedge.exe 2->13         started        process3 dnsIp4 58 205.209.99.112, 49767, 8888 IS-AS-1US United States 8->58 52 C:\Users\user\AppData\...\cookieextract.ps1, ASCII 8->52 dropped 54 C:\Users\user\AppData\...\ZjzKL2r.exe.log, ASCII 8->54 dropped 86 Detected unpacking (changes PE section rights) 8->86 88 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->88 90 Tries to detect sandboxes and other dynamic analysis tools (window names) 8->90 92 9 other signatures 8->92 15 powershell.exe 8->15         started        19 grpconv.exe 2 8->19         started        22 grpconv.exe 1 8->22         started        30 13 other processes 8->30 60 239.255.255.250 unknown Reserved 13->60 24 msedge.exe 13->24         started        26 msedge.exe 13->26         started        28 msedge.exe 13->28         started        file5 signatures6 process7 dnsIp8 64 127.0.0.1 unknown unknown 15->64 72 Attempt to bypass Chrome Application-Bound Encryption 15->72 74 Found many strings related to Crypto-Wallets (likely being stolen) 15->74 32 chrome.exe 15->32         started        35 msedge.exe 15->35         started        37 msedge.exe 15->37         started        39 2 other processes 15->39 50 C:\Users\user\AppData\...\places.sqlite-shm, data 19->50 dropped 76 Tries to harvest and steal browser information (history, passwords, etc) 19->76 66 s-part-0012.t-0009.t-msedge.net 13.107.246.40, 443, 49726, 49740 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 24->66 68 ln-0007.ln-msedge.net 150.171.22.17, 443, 49710 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 24->68 70 32 other IPs or domains 24->70 file9 signatures10 process11 dnsIp12 56 192.168.2.5, 138, 443, 49675 unknown unknown 32->56 41 chrome.exe 32->41         started        44 chrome.exe 32->44         started        46 msedge.exe 35->46         started        48 msedge.exe 37->48         started        process13 dnsIp14 62 www.google.com 142.250.80.4, 443, 49696, 49701 GOOGLEUS United States 41->62
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
.Net Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.GenSteal
Status:
Malicious
First seen:
2025-09-06 15:02:14 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 37 (59.46%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
admintool_extpassword admintool_bulletpassview zerotracestealer admintool_iepassview admintool_credentialsfileview nirsoft admintool_mailpassview
Similar samples:
Result
Malware family:
n/a
Score:
  9/10
Tags:
credential_access defense_evasion discovery execution stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks BIOS information in registry
Identifies Wine through registry keys
Uses browser remote debugging
Detected Nirsoft tools
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Malware family:
ChromePass
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:grakate_stealer_nov_2021
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of MFA browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:nirsoft_v1
Author:RandomMalware
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DestinyStealer

Executable exe b3a49ed46957bea9b6fa46b6f67445bc6e8885ae200c811a4b038d939b369aac

(this sample)

  
Delivery method
Distributed via web download

Comments