MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b68784056647ffcfefcb70ca44321b782930f91feed10033e5d48197368804a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ACRStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b68784056647ffcfefcb70ca44321b782930f91feed10033e5d48197368804a9
SHA3-384 hash: 7525c925b9902f1f6caf6eeb10dbccb9ffbce3eb5c48c6127b52a1efe59883a78e7d392f3dcb10ef305f7512f95a6230
SHA1 hash: c76e3c4b6efbb0d92f39b9a89cdd56d8cd0a46e3
MD5 hash: 7ec3ac5da9b47fb3d1f3b7543d49488f
humanhash: october-minnesota-whiskey-don
File name:Main Setup.zip
Download: download sample
Signature ACRStealer
File size:28'559'029 bytes
First seen:2026-03-17 19:55:12 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 786432:jKp/8/2Ahg5LGIlt/jsvSmx8RsucEj6m6Htt2GgGb:jKSeq2sJ8/QNzHb
TLSH T10C573374CA09E874E1B1FE7F90871626C9B0B30552783E46529832A54CEF2DBCF5477A
Magika zip
Reporter aachum
Tags:147-45-67-141 78-153-150-52 ACRStealer dllHijack zip


Avatar
iamaachum
https://iergfyelw.it.com/ => https://1drv.ms/u/c/6924206cee4a06ef/IQAqxM53TJnkRI86rSxCkcQdAVg61DGirAM6bGAqKf4TSdo?e=Ch8h1B

ACRStealer C2: 78.153.150.52:443
Dead drop resolver for ACRStealer: https://telegra.ph/Atkins-03-12
Unknown loader C2: 147.45.67.141:443

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Suspicious
Score:
50%
Tags:
infosteal
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.27 SOS: 0.29 SOS: 0.45 Zip Archive
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2026-03-17 19:56:20 UTC
File Type:
Binary (Archive)
Extracted files:
503
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ACRStealer

zip b68784056647ffcfefcb70ca44321b782930f91feed10033e5d48197368804a9

(this sample)

  
Delivery method
Distributed via web download

Comments