MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 efd34ae988e1203ea015b84d2ce234156aa4ac6555cdb90dc9b9ce356208bcf9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: efd34ae988e1203ea015b84d2ce234156aa4ac6555cdb90dc9b9ce356208bcf9
SHA3-384 hash: 85ee381cf58cfa527d2114e61ba0ebad6d1883087c7b9376331c67e91fb9d58fdc386863e0c952184b170d1e762187ac
SHA1 hash: 051df94f04b453d8a8c3dd1209a62a42cdf3456b
MD5 hash: a18cd7ec30217f33ab56412d9a9c1bf0
humanhash: uranus-pip-comet-one
File name:KittiesMC Launcher 1.0.0.exe
Download: download sample
File size:85'515'382 bytes
First seen:2026-02-09 21:38:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (566 x GuLoader, 122 x RemcosRAT, 82 x EpsilonStealer)
ssdeep 1572864:AejOYfhsHGleg4ybmMwcjavkIBFfQcTvk0rRYA+m9yZUL8V1UybGoaorPe7:A4JiGlPKNkavkI3jfrR2768VCybG1gm7
TLSH T15C183344D49CD431F3B1A0BBB22C5D3A649E87C017A75BFD972EE6A87324249EB0C65C
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10522/11/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon a078f0a8b6b6fc0c
Reporter smica83
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
139
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
KittiesMC Launcher 1.0.0.exe
Verdict:
Malicious activity
Analysis date:
2026-02-09 21:41:37 UTC
Tags:
auto-startup stealer github discord arch-doc susp-powershell ims-api generic nodejs

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
autorun xtreme shell sage
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-debug blackhole crypto installer installer installer-heuristic microsoft_visual_cc nsis packed soft-404
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-02-09T18:50:00Z UTC
Last seen:
2026-02-11T02:36:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.JS.Hosts.gen HEUR:Trojan-PSW.Win32.Stealer.gen HEUR:Trojan-PSW.JS.Stealer.gen HEUR:Trojan.Win32.Hosts.gen HEUR:Trojan.Script.Generic
Result
Threat name:
n/a
Detection:
malicious
Classification:
adwa.spyw.expl.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Drops large PE files
Drops VBS files to the startup folder
Encrypted powershell cmdline option found
Loading BitLocker PowerShell Module
Modifies the hosts file
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Capture Wi-Fi password
Sigma detected: Drops script at startup location
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: WScript or CScript Dropper
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Unusual module load detection (module proxying)
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1866377 Sample: KittiesMC Launcher 1.0.0.exe Startdate: 09/02/2026 Architecture: WINDOWS Score: 100 62 raw.githubusercontent.com 2->62 64 ipwho.is 2->64 66 discord.com 2->66 92 Sigma detected: Capture Wi-Fi password 2->92 94 Sigma detected: Drops script at startup location 2->94 96 Drops VBS files to the startup folder 2->96 98 5 other signatures 2->98 9 KittiesMC Launcher 1.0.0.exe 179 2->9         started        signatures3 process4 file5 46 C:\Users\user\...\KittiesMC Launcher.exe, PE32+ 9->46 dropped 48 C:\Users\user\AppData\Local\...\nsis7z.dll, PE32 9->48 dropped 50 C:\Users\user\AppData\Local\...\System.dll, PE32 9->50 dropped 52 10 other files (none is malicious) 9->52 dropped 12 KittiesMC Launcher.exe 63 9->12         started        process6 dnsIp7 74 raw.githubusercontent.com 185.199.111.133, 443, 49712 FASTLYUS Netherlands 12->74 76 ipwho.is 104.20.44.133, 443, 49698 CLOUDFLARENETUS United States 12->76 78 discord.com 162.159.128.233, 443, 49715, 49718 CLOUDFLARENETUS United States 12->78 54 C:\Windows\System32\drivers\etc\hosts, ASCII 12->54 dropped 56 C:\Users\user\AppData\...\WindowsUpdate.vbs, ASCII 12->56 dropped 58 f877f29b-4d9b-4881...68d4f6bed8.tmp.node, PE32+ 12->58 dropped 60 e933c3eb-d5eb-4122...c52769a371.tmp.node, PE32+ 12->60 dropped 106 Tries to harvest and steal browser information (history, passwords, etc) 12->106 108 Modifies the hosts file 12->108 110 Tries to harvest and steal WLAN passwords 12->110 17 cmd.exe 12->17         started        20 cmd.exe 12->20         started        22 explorer.exe 12->22 injected 24 14 other processes 12->24 file8 signatures9 process10 dnsIp11 80 Suspicious powershell command line found 17->80 82 Uses cmd line tools excessively to alter registry or file data 17->82 84 Encrypted powershell cmdline option found 17->84 90 2 other signatures 17->90 42 2 other processes 17->42 27 powershell.exe 20->27         started        30 conhost.exe 20->30         started        32 wscript.exe 22->32         started        34 msedge.exe 22->34         started        68 192.178.50.35, 443, 55238 GOOGLEUS United States 24->68 70 74.125.196.95, 443, 49716, 49717 GOOGLEUS United States 24->70 72 2 other IPs or domains 24->72 86 Query firmware table information (likely to detect VMs) 24->86 88 Tries to harvest and steal WLAN passwords 24->88 36 powershell.exe 24->36         started        38 chrome.exe 24->38         started        40 msedge.exe 24->40         started        44 13 other processes 24->44 signatures12 process13 signatures14 100 Loading BitLocker PowerShell Module 27->100 102 Windows Scripting host queries suspicious COM object (likely to drop second stage) 32->102 104 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 36->104
Gathering data
Result
Malware family:
n/a
Score:
  7/10
Tags:
defense_evasion discovery spyware stealer
Behaviour
Suspicious use of WriteProcessMemory
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Windows directory
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments