MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d0459a84ffc9b6f7eeb627e90b1879e8d1e477baff9db93dde2568c6100b6b3e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MaskGramStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 6 File information Comments

SHA256 hash: d0459a84ffc9b6f7eeb627e90b1879e8d1e477baff9db93dde2568c6100b6b3e
SHA3-384 hash: d0795016abffedc8369518a8d0d1358c7b8e3fe652ecfa31a5ff27fb17b3af0f03c1241cbaccac379f8775822422aec2
SHA1 hash: a4fe802a0c78311b462663b71b294d43e7beeb17
MD5 hash: ad3f250381a989386a1e510321ec44ef
humanhash: yankee-berlin-california-bulldog
File name:SoftWare.exe
Download: download sample
Signature MaskGramStealer
File size:407'333 bytes
First seen:2025-12-09 14:55:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 00ec1f9addbab7dd7a563fe6fe9caf72 (4 x Vidar, 2 x MaskGramStealer, 1 x XWorm)
ssdeep 12288:vKF6aBAuSXwatGFWHAouV8SH967yzZXhW:ycGWHAouVnHH8
Threatray 1'512 similar samples on MalwareBazaar
TLSH T12984E117B3E111F9E073813889A60A15FB76B85507519FEF03A44739AF27AD0AD3EB21
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter burger
Tags:exe MaskGramStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
SoftWare.exe
Verdict:
Malicious activity
Analysis date:
2025-12-09 14:54:51 UTC
Tags:
stealer svitstealer maskgramstealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
ransomware virus crypt
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Unauthorized injection to a recently created process
Restart of the analyzed sample
Connection attempt
Sending a custom TCP request
Behavior that indicates a threat
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Creating a file in the system32 subdirectories
Query of malicious DNS domain
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
base64 microsoft_visual_cc overlay vidar
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-12-09T12:32:00Z UTC
Last seen:
2025-12-11T05:56:00Z UTC
Hits:
~100
Detections:
Trojan.Win32.Inject.sb PDM:Trojan.Win32.Generic Trojan-PSW.Vidar.HTTP.C&C Trojan.Win32.Injuke.piby
Result
Threat name:
MaskGram Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Unusual module load detection (module proxying)
Yara detected MaskGram Stealer
Behaviour
Behavior Graph:
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Vidar
Status:
Malicious
First seen:
2025-12-09 14:55:27 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
27 of 37 (72.97%)
Threat level:
  5/5
Result
Malware family:
maskgram_stealer
Score:
  10/10
Tags:
family:maskgram_stealer spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Reads WinSCP keys stored on the system
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Detects MaskGramStealer payload
MaskGramStealer
Maskgram_stealer family
Malware Config
C2 Extraction:
mossyden2011.sbs
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
d0459a84ffc9b6f7eeb627e90b1879e8d1e477baff9db93dde2568c6100b6b3e
MD5 hash:
ad3f250381a989386a1e510321ec44ef
SHA1 hash:
a4fe802a0c78311b462663b71b294d43e7beeb17
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Debugger
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments