MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ce12d366e445692302ebdeb61257797e56927b3bb25703da12a95339ec151e82. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: ce12d366e445692302ebdeb61257797e56927b3bb25703da12a95339ec151e82
SHA3-384 hash: 276da71e480787de6d677ab1f75181b52d990ec3593fc052453956af82ae1732f9e67199cc2363df00d6029e137f717c
SHA1 hash: 901693980af656049f5fb44e5c1bccbdda8a9459
MD5 hash: a65082252ec43b16ebe8ee69ab6c0fd8
humanhash: mango-seventeen-red-purple
File name:steam.exe
Download: download sample
File size:647'168 bytes
First seen:2026-05-12 17:04:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2d82fa1cacd790ed7f75ad395579b8f2
ssdeep 12288:p80yLkgVMJqTn14P0cvAsnlDCP49xxmG79:pLyIUMJqT4LvRH9KG79
TLSH T1FFD46C1F259363D2F865923398BE22525B7CAB031B6964C7C48872784FB37C61C766BC
TrID 51.9% (.EXE) Win64 Executable (generic) (6522/11/2)
16.1% (.EXE) OS/2 Executable (generic) (2029/13)
15.9% (.EXE) Generic Win/DOS Executable (2002/3)
15.9% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
dhash icon 98e5c4d3f33c58e0
Reporter Alex_sev
Tags:exe infostealer Psw stealer steam

Intelligence


File Origin
# of uploads :
1
# of downloads :
147
Origin country :
AU AU
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
exe
Verdict:
Suspicious activity
Analysis date:
2026-05-12 17:06:37 UTC
Tags:
arch-exec

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug mingw overlay packed reconnaissance
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-03-29T17:12:00Z UTC
Last seen:
2026-05-14T14:20:00Z UTC
Hits:
~10000
Detections:
Trojan-PSW.Win64.Agent.afs
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Infostealer.Steam
Status:
Suspicious
First seen:
2026-03-30 08:57:28 UTC
File Type:
PE+ (Exe)
Extracted files:
9
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
ce12d366e445692302ebdeb61257797e56927b3bb25703da12a95339ec151e82
MD5 hash:
a65082252ec43b16ebe8ee69ab6c0fd8
SHA1 hash:
901693980af656049f5fb44e5c1bccbdda8a9459
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments