MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cdfe71f5f359be56fc6fb2b5bfa6c34042cd2e6114a82fa0c3b147106e731d6a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 13 File information Comments

SHA256 hash: cdfe71f5f359be56fc6fb2b5bfa6c34042cd2e6114a82fa0c3b147106e731d6a
SHA3-384 hash: 2dfa4b0e46c78a352b85dabf42e5caafd9413382c20fc9edbaeaae7f3e4f3fddae0b9c25cf1c44ef5cebef1b128efe10
SHA1 hash: b901e328769d626ff997af4c10d058cd8d677235
MD5 hash: d3884cc519c6855ae20d64264d5f6e93
humanhash: william-autumn-whiskey-freddie
File name:8QivM1I.exe
Download: download sample
Signature RustyStealer
File size:4'078'080 bytes
First seen:2025-05-09 19:54:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b25557f316c563f336766cfbc5e9ece4 (6 x RustyStealer)
ssdeep 98304:17gzJ00PvGXsDhHUqyKXqyuYugTwCIyu4Crk6iJp:qPdeKXqyuYhT1Iyuq6
TLSH T1D91623C61C499579D3A5C3B51EFED332E926354E0A242B7F62F699313F08E811E11B2B
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter aachum
Tags:exe RustyStealer


Avatar
iamaachum
http://185.156.72.121/files/6051142952/8QivM1I.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
427
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
820e40285429a78a439c4f2fd7b89e463adc156be8617bf49cf7712b698d2e41.exe
Verdict:
Malicious activity
Analysis date:
2025-05-08 19:41:34 UTC
Tags:
lumma stealer themida amadey loader botnet telegram connectwise rmm-tool credentialflusher

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
91.7%
Tags:
obfuscate xtreme spawn
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
Creating a file
Launching the process to interact with network services
Launching a process
Setting a single autorun event
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug crypt packed packed packer_detected
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win64.Trojan.Injuke
Status:
Malicious
First seen:
2025-05-08 22:13:15 UTC
File Type:
PE+ (Exe)
AV detection:
24 of 37 (64.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution persistence
Behaviour
NTFS ADS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
cdfe71f5f359be56fc6fb2b5bfa6c34042cd2e6114a82fa0c3b147106e731d6a
MD5 hash:
d3884cc519c6855ae20d64264d5f6e93
SHA1 hash:
b901e328769d626ff997af4c10d058cd8d677235
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_Zoom_Invite_malware_RAT_C2
Author:daniyyell
Description:Detects Zoom Invite Call Leading to Malware Hosted in Telegram C2
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SUSP_Scheduled_Tasks_Create_From_Susp_Dir
Author:SECUINFRA Falcon Team
Description:Detects a PowerShell Script that creates a Scheduled Task that runs from an suspicious directory
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RustyStealer

Executable exe cdfe71f5f359be56fc6fb2b5bfa6c34042cd2e6114a82fa0c3b147106e731d6a

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileMappingA
KERNEL32.dll::CreateFileW

Comments