MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf8c6a5003c133a7ff979bb5629e0354a11b0297723eea90b1b03e5ead04d6ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ACRStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 14 File information Comments

SHA256 hash: cf8c6a5003c133a7ff979bb5629e0354a11b0297723eea90b1b03e5ead04d6ea
SHA3-384 hash: 27c2561f99c82bab3c508ba8e38f3a70729797a7bbde473a41be5bd6545b859f8f5bcb997ee6845c1c27b5664789c235
SHA1 hash: dab8311deebb1d355438d3f9b689aebea2d666cc
MD5 hash: a0a8ceb32824464b76ccd44fc046b6fc
humanhash: dakota-victor-bluebird-white
File name:python35.dll
Download: download sample
Signature ACRStealer
File size:7'264'256 bytes
First seen:2026-04-14 13:43:56 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash a90609ee973c8ba5f091fd392ba83911 (5 x ACRStealer)
ssdeep 98304:JfTrOoo9MLKbZqoqn6r4FHlMZsky5ZAdsC5ssd1+PkLuwW5ahqQ:JnOoo5RvZXLuwVA
TLSH T1CC76AE32B605603AD4F71536A1776A784D3BBE503B269CD756E438CC8F325C22A7A24F
TrID 69.9% (.AX) DirectShow filter (201555/2/20)
14.4% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
5.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
2.2% (.EXE) Win64 Executable (generic) (6522/11/2)
Magika pebin
dhash icon 7af6f2babc6c9ec4 (8 x Resur, 5 x Jadtre, 5 x Wapomi)
Reporter aachum
Tags:ACRStealer dll dllHijack system-latitudeprevalent-cfd


Avatar
iamaachum
https://hostckyd3.it.com/ => https://www.mediafire.com/file/qzv8q6ribs3qsog/D0WNL0AD+SETUP+FILE+(KEY_1940).zip/file

ACRStealer C2: system.latitudeprevalent.cfd

Intelligence


File Origin
# of uploads :
1
# of downloads :
170
Origin country :
ES ES
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
90.2%
Tags:
virus
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug base64 crypto expired-cert fingerprint keylogger microsoft_visual_cc packed
Verdict:
Clean
File Type:
dll x32
First seen:
2026-04-14T03:38:00Z UTC
Last seen:
2026-04-15T05:49:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1898106 Sample: python35.dll Startdate: 14/04/2026 Architecture: WINDOWS Score: 48 28 Multi AV Scanner detection for submitted file 2->28 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 24 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 16 12->20         started        22 WerFault.exe 18 14->22         started        24 WerFault.exe 16 16->24         started        process6 26 WerFault.exe 20 16 18->26         started       
Gathering data
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2026-04-14 02:37:06 UTC
File Type:
PE (Dll)
Extracted files:
81
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
cf8c6a5003c133a7ff979bb5629e0354a11b0297723eea90b1b03e5ead04d6ea
MD5 hash:
a0a8ceb32824464b76ccd44fc046b6fc
SHA1 hash:
dab8311deebb1d355438d3f9b689aebea2d666cc
SH256 hash:
4075c0055bc84f944090d88ac02493cde13b87cd5c7eb27d23f7f340a285485e
MD5 hash:
8b688dcf34d6aecff734c05b5cb83bf0
SHA1 hash:
828b9ea5145eb4a0bebdef56ce38313190e143b1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:telebot_framework
Author:vietdx.mb
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ACRStealer

DLL dll cf8c6a5003c133a7ff979bb5629e0354a11b0297723eea90b1b03e5ead04d6ea

(this sample)

Comments