MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f22c86bab983bbeb3107509942ef3d9e2ebd514765327af93d8e05e8909560de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RustyStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 25 File information Comments

SHA256 hash: f22c86bab983bbeb3107509942ef3d9e2ebd514765327af93d8e05e8909560de
SHA3-384 hash: 105711c6e51f7e12dc526ac2fa97b61c298154e5e3e5eb1a2f1d397f2ec8f735519dc5500b9da896b801fb462b2573cb
SHA1 hash: 421d9d8da86e208b54e9a865df41cae613ff48b7
MD5 hash: 97e012c2a3f7d2212f2e7ca12ca01165
humanhash: mexico-washington-fruit-uncle
File name:svchost.exe
Download: download sample
Signature RustyStealer
File size:1'882'897 bytes
First seen:2025-08-22 18:32:00 UTC
Last seen:2025-08-22 21:18:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash bf94b5da701035ed0fd09d971a601c9c (1 x RustyStealer)
ssdeep 49152:A23tLztWAZKSrW2QrRSgLiKCEmfReyxf4udBSq:A29LztWKDJK9//mZt4udQq
TLSH T14295330A7319FAA9FD154FB2BEE70011EA5BBEA46295169FD4BCAB49CD3D0C814C70C4
TrID 63.5% (.EXE) UPX compressed Win64 Executable (70117/5/12)
24.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.8% (.ICL) Windows Icons Library (generic) (2059/9)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter aachum
Tags:blackhatusa-com exe PRYSMAXStealer


Avatar
iamaachum
https://blackhatusa.com/svchost.exe

IOC: thenewflights.xyz

Intelligence


File Origin
# of uploads :
3
# of downloads :
52
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
https://www.mediafire.com/file/tsjwllp1txxfusa/Office+Exploit+Builder+2025.zip/file
Verdict:
Malicious activity
Analysis date:
2025-08-12 10:40:47 UTC
Tags:
loader miner xmrig blankgrabber telegram evasion github crypto-regex vobfus worm stealer uac screenshot prysmax python pyinstaller

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
virus spawn sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a file in the %AppData% subdirectories
Launching a process
Enabling the 'hidden' option for recently created files
Creating a file
Behavior that indicates a threat
DNS request
Connection attempt
Sending a custom TCP request
Launching a service
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Searching for the window
Creating a window
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a single autorun event
Launching a tool to kill processes
Stealing user critical data
Enabling autorun
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug crypto mingw overlay packed packed packed packed stealer upx zusy
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-08-09T13:24:00Z UTC
Last seen:
2025-08-09T13:24:00Z UTC
Hits:
~100
Result
Threat name:
PRYSMAX STEALER
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Attempt to bypass Chrome Application-Bound Encryption
Creates a Image File Execution Options (IFEO) Debugger entry
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Excessive usage of taskkill to terminate processes
Found direct / indirect Syscall (likely to bypass EDR)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: BloodHound Collection Files
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: System File Execution Location Anomaly
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected PRYSMAX STEALER
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1763193 Sample: svchost.exe Startdate: 22/08/2025 Architecture: WINDOWS Score: 100 52 tools.l.google.com 2->52 54 tools.google.com 2->54 56 3 other IPs or domains 2->56 70 Antivirus / Scanner detection for submitted sample 2->70 72 Multi AV Scanner detection for submitted file 2->72 74 Yara detected PRYSMAX STEALER 2->74 76 4 other signatures 2->76 8 svchost.exe 3 123 2->8         started        13 runtime_broker.exe 2->13         started        15 runtime_broker.exe 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 60 steamcommunity.com 23.204.10.89, 443, 49687 AKAMAI-ASUS United States 8->60 62 127.0.0.1 unknown unknown 8->62 46 C:\Users\user\AppData\...\runtime_broker.exe, PE32+ 8->46 dropped 48 C:\...\runtime_broker.exe:Zone.Identifier, ASCII 8->48 dropped 50 C:\Users\user\AppData\...\3_containers.json, JSON 8->50 dropped 80 System process connects to network (likely due to code injection or exploit) 8->80 82 Attempt to bypass Chrome Application-Bound Encryption 8->82 84 Suspicious powershell command line found 8->84 90 8 other signatures 8->90 19 powershell.exe 8->19         started        22 chrome.exe 8->22         started        25 powershell.exe 15 8->25         started        27 64 other processes 8->27 86 Antivirus detection for dropped file 13->86 88 Multi AV Scanner detection for dropped file 13->88 file6 signatures7 process8 dnsIp9 78 Loading BitLocker PowerShell Module 19->78 29 conhost.exe 19->29         started        58 192.168.2.6, 138, 443, 49235 unknown unknown 22->58 31 chrome.exe 22->31         started        34 conhost.exe 25->34         started        36 cmdkey.exe 25->36         started        38 conhost.exe 27->38         started        40 conhost.exe 27->40         started        42 conhost.exe 27->42         started        44 61 other processes 27->44 signatures10 process11 dnsIp12 64 www.google.com 142.251.40.164, 443, 49696, 49707 GOOGLEUS United States 31->64 66 192.168.2.5 unknown unknown 31->66 68 4 other IPs or domains 31->68
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Kepavll
Status:
Malicious
First seen:
2025-08-09 16:42:27 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
24 of 36 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
credential_access defense_evasion discovery execution persistence privilege_escalation spyware stealer upx
Behaviour
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Browser Information Discovery
Event Triggered Execution: Netsh Helper DLL
Drops file in Windows directory
Hide Artifacts: Ignore Process Interrupts
Enumerates processes with tasklist
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Command and Scripting Interpreter: PowerShell
Enumerates connected drives
Credentials from Password Stores: Windows Credential Manager
Executes dropped EXE
Reads ssh keys stored on the system
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Event Triggered Execution: Image File Execution Options Injection
Modifies Windows Firewall
Modifies trusted root certificate store through registry
Uses browser remote debugging
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
f22c86bab983bbeb3107509942ef3d9e2ebd514765327af93d8e05e8909560de
MD5 hash:
97e012c2a3f7d2212f2e7ca12ca01165
SHA1 hash:
421d9d8da86e208b54e9a865df41cae613ff48b7
SH256 hash:
52dfbab14ed749b5921520c24f1cc2cada85113e518aac185dec50d93f406148
MD5 hash:
23115b11d0a9ade1b0bc1826497efcba
SHA1 hash:
b37ce7420e2f175767c746fd0e3d4ffc3d23dccf
Detections:
PrysmaxStealer INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Malware family:
EddieStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:generic_IG_stealer
Author:RE4rensics
Description:Detects stealers that interacts with IG endpoints after stealing IG cookies
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RustyStealer

Executable exe f22c86bab983bbeb3107509942ef3d9e2ebd514765327af93d8e05e8909560de

(this sample)

Comments