MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f586a976f30c0ca2db397967fad038be4618753da5c22e00cbdce7e91a7351f5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 8 File information Comments

SHA256 hash: f586a976f30c0ca2db397967fad038be4618753da5c22e00cbdce7e91a7351f5
SHA3-384 hash: 490209d58fe083fb3a2ba7619efa64a07fc1105c3744e6f0c3117622042e3f54133e4e07a99075195eac8e6906f15b36
SHA1 hash: 8559778bf5057e16c8178e8e235b79253f6cc97a
MD5 hash: d4e7ecce9c53d2e79d95f405202c8842
humanhash: yellow-friend-hotel-steak
File name:ture.exe
Download: download sample
File size:533'504 bytes
First seen:2025-12-11 15:10:24 UTC
Last seen:2025-12-11 18:04:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 767ff3ea6fe2972cdfaf27b2138dd49f
ssdeep 12288:nyap35Kbei2whY2zSikbcetqCD2vOhXCa3+:yap35PSq2Hk9gy2eXC
TLSH T185B47D9DE6A407F9D1EAD678CD024507E772BC464771A64F03E08EA61F236A09E3FB11
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
98
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
_f586a976f30c0ca2db397967fad038be4618753da5c22e00cbdce7e91a7351f5.exe
Verdict:
Malicious activity
Analysis date:
2025-12-11 15:10:50 UTC
Tags:
stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm base64 crypto evasive fingerprint hacktool microsoft_visual_cc
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-12-11T12:21:00Z UTC
Last seen:
2025-12-12T05:27:00Z UTC
Hits:
~100
Detections:
Trojan-PSW.Win64.Stealer.apjw Trojan-PSW.Win32.Stealer.sb Trojan-Spy.Agent.TCP.C&C VHO:Trojan-PSW.Win64.Stealer.apjw Trojan-PSW.Stealer.TCP.C&C Trojan-PSW.Stealer.HTTP.C&C Trojan-PSW.MSIL.Stealer.sb Trojan-PSW.BroPass.HTTP.C&C VHO:Trojan-PSW.Win32.Stealer.gen Trojan-PSW.Win32.Coins.sb Trojan-PSW.Vidar.HTTP.C&C PDM:Trojan.Win32.Generic
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Changes memory attributes in foreign processes to executable or writable
Creates a thread in another existing process (thread injection)
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1831006 Sample: ture.exe Startdate: 11/12/2025 Architecture: WINDOWS Score: 100 52 jjjgaasda.live 2->52 54 steamcommunity.com 2->54 76 Suricata IDS alerts for network traffic 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 Antivirus detection for URL or domain 2->80 82 2 other signatures 2->82 8 ture.exe 2->8         started        12 msedge.exe 2->12         started        14 msedge.exe 2->14         started        signatures3 process4 dnsIp5 56 jjjgaasda.live 151.243.113.71, 443, 49719, 49747 RASANAIR Iran (ISLAMIC Republic Of) 8->56 58 steamcommunity.com 104.67.208.180, 443, 49718 CMCSUS United States 8->58 84 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->84 86 Hijacks the control flow in another process 8->86 88 Found many strings related to Crypto-Wallets (likely being stolen) 8->88 90 7 other signatures 8->90 16 msedge.exe 100 518 8->16         started        21 chrome.exe 8->21         started        23 msedge.exe 11 8->23         started        25 msedge.exe 12->25         started        27 msedge.exe 14->27         started        signatures6 process7 dnsIp8 46 192.168.2.6 unknown unknown 16->46 48 239.255.255.250 unknown Reserved 16->48 42 C:\Users\user\AppData\Local\...\Login Data, SQLite 16->42 dropped 44 C:\Users\user\AppData\Local\...\History, SQLite 16->44 dropped 72 Found strings related to Crypto-Mining 16->72 74 Maps a DLL or memory area into another process 16->74 29 msedge.exe 16->29         started        32 msedge.exe 16->32         started        34 msedge.exe 16->34         started        40 3 other processes 16->40 50 192.168.2.4, 138, 443, 49228 unknown unknown 21->50 36 chrome.exe 21->36         started        38 msedge.exe 23->38         started        file9 signatures10 process11 dnsIp12 60 13.107.246.40, 443, 49775, 49776 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 29->60 62 part-0029.t-0009.t-msedge.net 13.107.246.57, 443, 49724, 49761 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 29->62 68 29 other IPs or domains 29->68 64 www.google.com 108.177.122.104, 443, 49728, 49729 GOOGLEUS United States 36->64 66 play.google.com 142.250.9.101, 443, 49743, 49744 GOOGLEUS United States 36->66 70 3 other IPs or domains 36->70
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Infostealer.WallStealer
Status:
Malicious
First seen:
2025-12-11 15:10:40 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Browser Information Discovery
Drops file in Windows directory
Reads user/profile data of web browsers
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f586a976f30c0ca2db397967fad038be4618753da5c22e00cbdce7e91a7351f5
MD5 hash:
d4e7ecce9c53d2e79d95f405202c8842
SHA1 hash:
8559778bf5057e16c8178e8e235b79253f6cc97a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:dgaagas
Author:Harshit
Description:Uses certutil.exe to download a file named test.txt
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:RANSOMWARE
Author:ToroGuitar

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe f586a976f30c0ca2db397967fad038be4618753da5c22e00cbdce7e91a7351f5

(this sample)

  
Delivery method
Distributed via web download

Comments