MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d7b9313f279a44552dcc0d36ab468a8071c3e3b0f7ce7b4cf9d9417930bea4f6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PythonStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 8 File information Comments

SHA256 hash: d7b9313f279a44552dcc0d36ab468a8071c3e3b0f7ce7b4cf9d9417930bea4f6
SHA3-384 hash: 7463d14ca0697028a05753d2cf9ebd276ee9f71fdaf517dbf8046c7816333bea285dcc8a1a05cffe5b038684861238f4
SHA1 hash: 7168caf6352b35ef2b3f713b9e975d59e992bded
MD5 hash: 55a4c55d51477498838467835e95fd69
humanhash: social-eleven-violet-shade
File name:StakeBotPro.exe
Download: download sample
Signature PythonStealer
File size:25'258'435 bytes
First seen:2026-02-03 19:43:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash dcaf48c1f10b0efa0a4472200f3850ed (43 x BlankGrabber, 22 x Efimer, 18 x PythonStealer)
ssdeep 393216:9qV5nSW0w5XCwzBMvXU7DtpVuLBFVa1DPsZg2KeqZvSa4zK4gnZuHsF5laSjdbY3:9qVB0wgURWu1wLXqd4mZkEUSpbIxZ
TLSH T14A4733D99FE00445CC67273E28A06A33A3E5BCB91D74C68F1BE035652F736DAAD35242
TrID 66.6% (.EXE) InstallShield setup (43053/19/16)
16.2% (.EXE) Win64 Executable (generic) (10522/11/4)
7.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.1% (.EXE) OS/2 Executable (generic) (2029/13)
3.0% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter aachum
Tags:exe PythonStealer


Avatar
iamaachum
https://www.youtube.com/watch?v=AbWp5I3oFkA => https://www.mediafire.com/folder/i9dp5riuxuqnb/Stakebot

Intelligence


File Origin
# of uploads :
1
# of downloads :
122
Origin country :
ES ES
Vendor Threat Intelligence
Malware configuration found for:
PyInstaller
Details
PyInstaller
a compiled assembly and a Python version
Malware family:
n/a
ID:
1
File name:
StakeBotPro.exe
Verdict:
Malicious activity
Analysis date:
2026-02-03 19:45:32 UTC
Tags:
pyinstaller python auto-reg stealer telegram ims-api generic crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Enabling the 'hidden' option for recently created files
Using the Windows Management Instrumentation requests
Creating a process from a recently created file
Launching a process
DNS request
Connection attempt
Delayed reading of the file
Creating a file in the %temp% subdirectories
Sending a custom TCP request
Restart of the analyzed sample
Creating a window
Running batch commands
Creating a process with a hidden window
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
Creating a file in the %AppData% subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
expand installer-heuristic lolbin microsoft_visual_cc overlay packed pyinstaller
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-02-03T17:17:00Z UTC
Last seen:
2026-02-04T05:19:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Python.Agent.gen Trojan-PSW.Win32.Coins.sb Trojan-PSW.Win32.Agent.sba Trojan-PSW.Win32.Agent.sb Trojan-Banker.Win32.Express.sb Trojan.Win64.Agent.sb Trojan.Win32.Agent.sb PDM:Trojan.Win32.Generic
Result
Threat name:
Python Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
76 / 100
Signature
Excessive usage of taskkill to terminate processes
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Python Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1862795 Sample: StakeBotPro.exe Startdate: 03/02/2026 Architecture: WINDOWS Score: 76 124 api.telegram.org 2->124 132 Multi AV Scanner detection for submitted file 2->132 134 Yara detected Telegram RAT 2->134 136 Yara detected Generic Python Stealer 2->136 11 StakeBotPro.exe 1001 2->11         started        15 UpdateHost.exe 2->15         started        17 UpdateHost.exe 2->17         started        signatures3 138 Uses the Telegram API (likely for C&C communication) 124->138 process4 file5 98 C:\Users\user\AppData\Local\...\zlib1.dll, PE32+ 11->98 dropped 100 C:\Users\user\AppData\...\win32crypt.pyd, PE32+ 11->100 dropped 102 C:\Users\user\AppData\Local\...\win32cred.pyd, PE32+ 11->102 dropped 110 80 other files (none is malicious) 11->110 dropped 142 Self deletion via cmd or bat file 11->142 19 StakeBotPro.exe 1 9 11->19         started        104 C:\Users\user\AppData\Local\...\zlib1.dll, PE32+ 15->104 dropped 106 C:\Users\user\AppData\...\win32crypt.pyd, PE32+ 15->106 dropped 108 C:\Users\user\AppData\Local\...\win32cred.pyd, PE32+ 15->108 dropped 112 80 other files (none is malicious) 15->112 dropped 22 UpdateHost.exe 15->22         started        114 83 other files (none is malicious) 17->114 dropped 25 UpdateHost.exe 17->25         started        signatures6 process7 file8 92 C:\Users\user\AppData\...\UpdateHost.exe, PE32+ 19->92 dropped 94 C:\Users\...\UpdateHost.exe:Zone.Identifier, ASCII 19->94 dropped 96 C:\Users\user\AppData\...\~cleanup_2608.bat, DOS 19->96 dropped 27 UpdateHost.exe 19->27         started        30 cmd.exe 19->30         started        32 cmd.exe 19->32         started        140 Tries to harvest and steal browser information (history, passwords, etc) 22->140 34 cmd.exe 22->34         started        37 cmd.exe 22->37         started        39 cmd.exe 22->39         started        43 2 other processes 22->43 41 cmd.exe 25->41         started        signatures9 process10 file11 116 C:\Users\user\AppData\Local\...\zlib1.dll, PE32+ 27->116 dropped 118 C:\Users\user\AppData\...\win32crypt.pyd, PE32+ 27->118 dropped 120 C:\Users\user\AppData\Local\...\win32cred.pyd, PE32+ 27->120 dropped 122 80 other files (none is malicious) 27->122 dropped 45 UpdateHost.exe 27->45         started        49 conhost.exe 30->49         started        51 timeout.exe 30->51         started        53 conhost.exe 32->53         started        130 Excessive usage of taskkill to terminate processes 34->130 57 2 other processes 34->57 59 2 other processes 37->59 61 2 other processes 39->61 55 conhost.exe 41->55         started        63 3 other processes 43->63 signatures12 process13 dnsIp14 126 api.telegram.org 149.154.166.110, 443, 49697, 49699 TELEGRAMRU United Kingdom 45->126 144 Tries to harvest and steal browser information (history, passwords, etc) 45->144 65 cmd.exe 45->65         started        68 cmd.exe 45->68         started        70 cmd.exe 45->70         started        72 7 other processes 45->72 signatures15 process16 signatures17 128 Excessive usage of taskkill to terminate processes 65->128 74 conhost.exe 65->74         started        76 taskkill.exe 65->76         started        78 conhost.exe 68->78         started        80 taskkill.exe 68->80         started        82 conhost.exe 70->82         started        84 taskkill.exe 70->84         started        86 conhost.exe 72->86         started        88 conhost.exe 72->88         started        90 10 other processes 72->90 process18
Gathering data
Gathering data
Threat name:
Win64.Trojan.Giant
Status:
Malicious
First seen:
2026-02-03 19:55:16 UTC
File Type:
PE+ (Exe)
Extracted files:
2279
AV detection:
8 of 36 (22.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion persistence pyinstaller
Behaviour
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:Detect_PyInstaller
Author:Obscurity Labs LLC
Description:Detects PyInstaller compiled executables across platforms
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:telebot_framework
Author:vietdx.mb
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

PythonStealer

Executable exe d7b9313f279a44552dcc0d36ab468a8071c3e3b0f7ce7b4cf9d9417930bea4f6

(this sample)

  
Delivery method
Distributed via web download

Comments