MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e753d757d44da6574603ca2940623935afa225d8b8dc982ad2c00bd8f72bb44a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: e753d757d44da6574603ca2940623935afa225d8b8dc982ad2c00bd8f72bb44a
SHA3-384 hash: 60122eee7e47d97ac1dde355f58702f89c58581e0017535b537de734487a7654ad2939cb3a945d71f156b788cccf6463
SHA1 hash: 1dec5a8c868a157763651a606982b3e634416f62
MD5 hash: 26e9401754a0fe30f1e579b33132c78c
humanhash: helium-mexico-chicken-twenty
File name:Updaters.exe
Download: download sample
Signature RustyStealer
File size:3'461'120 bytes
First seen:2023-05-14 17:12:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 23485cf57ab2dcc3f15963e3cce18563 (1 x RustyStealer)
ssdeep 49152:YnsOWmW4HxLq9f7Da3c9JUWDqEPFeH9GxN4A2af5Kq:oWjp9eH93A2Dq
TLSH T12BF518703F499AAEC05AC074D2468B626A3174CA0F35BAFF45D466383E29AF51F3D358
TrID 44.4% (.EXE) Win64 Executable (generic) (10523/12/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 3b73494b59595b53 (4 x CoinMiner, 2 x RedLineStealer, 2 x RustyStealer)
Reporter JaffaCakes118
Tags:exe RustyStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
291
Origin country :
GB GB
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Updaters.rar
Verdict:
Malicious activity
Analysis date:
2023-05-01 08:26:51 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
56 / 100
Signature
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Suspicious powershell command line found
Uses known network protocols on non-standard ports
Very long command line found
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 855604 Sample: Updaters.exe Startdate: 28/04/2023 Architecture: WINDOWS Score: 56 31 Snort IDS alert for network traffic 2->31 33 Malicious sample detected (through community Yara rule) 2->33 35 Antivirus detection for URL or domain 2->35 37 5 other signatures 2->37 9 Updaters.exe 3 2->9         started        process3 dnsIp4 29 94.142.138.61, 49697, 80 IHOR-ASRU Russian Federation 9->29 25 C:\Users\user\AppData\...\Rc5bqirAmL.exe, PE32 9->25 dropped 13 cmd.exe 1 9->13         started        file5 process6 process7 15 Rc5bqirAmL.exe 3 13->15         started        18 conhost.exe 13->18         started        signatures8 39 Antivirus detection for dropped file 15->39 41 Suspicious powershell command line found 15->41 43 Very long command line found 15->43 45 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 15->45 20 powershell.exe 14 15->20         started        process9 dnsIp10 27 91.215.85.198, 35964, 49700 PINDC-ASRU Russian Federation 20->27 23 conhost.exe 20->23         started        process11
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2023-04-25 18:44:57 UTC
File Type:
PE+ (Exe)
Extracted files:
15
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
e753d757d44da6574603ca2940623935afa225d8b8dc982ad2c00bd8f72bb44a
MD5 hash:
26e9401754a0fe30f1e579b33132c78c
SHA1 hash:
1dec5a8c868a157763651a606982b3e634416f62
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RustyStealer

Executable exe e753d757d44da6574603ca2940623935afa225d8b8dc982ad2c00bd8f72bb44a

(this sample)

  
Delivery method
Distributed via web download

Comments