MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e87df996786ff1613b8550abf66de6456faaf7e1a26e9217cd17a2f5a6caad50. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



KeshXrdStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 16 File information Comments

SHA256 hash: e87df996786ff1613b8550abf66de6456faaf7e1a26e9217cd17a2f5a6caad50
SHA3-384 hash: ec3157bdc6a18781e7bbf70c8fcacf8773352afaf1895e6e2fe4454ac176e8fcfb0f6feddba83a81f72f62d55c1ca7fe
SHA1 hash: 2df125d457121e46323ab36f5a60d3aa6ad48972
MD5 hash: facff72b6a876d605b1854be16f21d44
humanhash: louisiana-louisiana-nevada-burger
File name:e87df996786ff1613b8550abf66de6456faaf7e1a26e9217cd17a2f5a6caad50
Download: download sample
Signature KeshXrdStealer
File size:1'632'768 bytes
First seen:2026-05-12 18:48:18 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash dae02f32a21e03ce65412f6e56942daa (123 x YellowCockatoo, 60 x CobaltStrike, 44 x JanelaRAT)
ssdeep 49152:b8t85ftfAu4+hgfAxPOxJvROaYR86unXjkv:au4+AAGbvROaYyFnA
TLSH T14375F119E7E805E9E1FBD678C8224506C772F80A0B31EB8F079959D91F337909D39B22
TrID 21.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
21.2% (.EXE) Win64 Executable (generic) (6522/11/2)
16.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
14.6% (.EXE) Win32 Executable (generic) (4504/4/1)
6.6% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter Threatray
Tags:dll KeshXrdStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
135
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal vmdetect
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm anti-vm base64 evasive eventvwr fingerprint lolbin obfuscated packed reconnaissance reconnaissance
Verdict:
Malicious
Labled as:
Win64_HackTool_PSWDump_P_trojan
Verdict:
Malicious
File Type:
executable.pe.32.dll
First seen:
2026-04-22T00:36:00Z UTC
Last seen:
2026-05-14T03:30:00Z UTC
Hits:
~10
Detections:
Trojan.MSIL.Agent.sb HEUR:Exploit.MSIL.BypassUAC.c
Verdict:
inconclusive
YARA:
6 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.27 Win 32 Exe x86
Threat name:
Win32.Trojan.Jalapeno
Status:
Malicious
First seen:
2026-04-22 07:53:30 UTC
File Type:
PE (.Net Dll)
Extracted files:
2
AV detection:
20 of 36 (55.56%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
keshxrdstealer
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
e87df996786ff1613b8550abf66de6456faaf7e1a26e9217cd17a2f5a6caad50
MD5 hash:
facff72b6a876d605b1854be16f21d44
SHA1 hash:
2df125d457121e46323ab36f5a60d3aa6ad48972
SH256 hash:
88043db62a7dbf4f482cc1478776186e34ec26477361156e3f8a2baf2f12dfe0
MD5 hash:
05c910bb6fbc5030e536b711025c6a2c
SHA1 hash:
f8b98c2450d8121b0f44cb537aca039d31bc7901
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_B64_Encoded_UserAgent
Author:ditekSHen
Description:Detects executables containing base64 encoded User Agent
Rule name:INDICATOR_SUSPICIOUS_EXE_DiscordURL
Author:ditekSHen
Description:Detects executables Discord URL observed in first stage droppers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb
Author:ditekSHen
Description:Detects executables referencing combination of virtualization drivers
Rule name:NET
Author:malware-lu
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments