MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e5a5f1d25e05687a214f1305ab6ab307dadbcf997e6f632756b67c9579a5fe0e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 18 File information Comments

SHA256 hash: e5a5f1d25e05687a214f1305ab6ab307dadbcf997e6f632756b67c9579a5fe0e
SHA3-384 hash: ce0ec77ff3aaff824591790756142455bcfd5ff6c20db7c09cc5c10e9b018f05c57855f2d05dc8fa3d7ac67728624040
SHA1 hash: 8a48d4d963d97409c5062b062eaef86aee920c95
MD5 hash: b3ee8558ad35d1531f5f8458f649f5a9
humanhash: colorado-august-alanine-charlie
File name:888.exe
Download: download sample
Signature RustyStealer
File size:81'190'688 bytes
First seen:2026-02-15 19:14:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 103 x GuLoader, 64 x DiamondFox)
ssdeep 1572864:3slzi4uN38yUrBSXdkkWyzvLwI/kSEfYiMF1DsBbGebCPk:36zPuNzUCVzvF/kHfYHslnCPk
Threatray 58 similar samples on MalwareBazaar
TLSH T1430833C46969F54FF39C897CC9A1E27E8BF8A91FF4F04488E7684D56462618162BFF00
TrID 50.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
10.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.5% (.EXE) Win64 Executable (generic) (6522/11/2)
8.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.2% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 696a6ee2b2b2c2cc (20 x ValleyRAT, 18 x RedLineStealer, 17 x LummaStealer)
Reporter petrovic
Tags:exe RustyStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
155
Origin country :
RO RO
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
888.exe
Verdict:
Malicious activity
Analysis date:
2026-02-15 19:16:04 UTC
Tags:
roning loader anti-evasion rust stealer auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
emotet cobalt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a file in the Program Files subdirectories
Creating a process from a recently created file
Connection attempt
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Creating a service
Launching a service
Loading a system driver
Creating a file in the Windows directory
Loading a suspicious library
Running batch commands
Creating a process with a hidden window
Forced system process termination
Deleting a recently created file
Creating a file in the system32 directory
Creating a window
Enabling autorun for a service
Unauthorized injection to a system process
Blocking the Windows Defender launch
Enabling autorun by creating a file
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug installer-heuristic overlay soft-404
Verdict:
Malicious
File Type:
exe x32
Detections:
Trojan.Win32.PoolInject.sba Trojan.DLLhijack.TCP.ServerRequest Trojan.Win32.Agent.sb HEUR:Trojan.Win32.DLLhijack.gen
Gathering data
Threat name:
Win32.Dropper.Malgent
Status:
Malicious
First seen:
2026-02-15 19:52:00 UTC
AV detection:
19 of 38 (50.00%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion discovery persistence privilege_escalation spyware stealer trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
System Time Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Enumerates processes with tasklist
Modifies Security services
Checks installed software on the system
Checks whether UAC is enabled
Checks computer location settings
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Boot or Logon Autostart Execution: Active Setup
Modifies security service
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware family:
Terminator.Spyboy
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:EDR_Killer_EDR_Freeze_Tool
Author:Valton Tahiri (cybee.ai)
Description:Detects EDR-Freeze tool in memory - EDR/AV freezing malware
Reference:https://www.linkedin.com/in/valton-tahiri/
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Suspicious_Process
Author:Security Research Team
Description:Suspicious process creation
Rule name:Sus_All_Windows_PE_Malware
Author:DiegoAnalytics
Description:Detects Windows PE malware of all types, avoids non-executables like .html
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/
Rule name:Windows_Trojan_RoningLoader_a4e851ac
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments