MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f86352ecaf34773e85d979220b9825f6c1ec45b5c93d5ecca9998dc2b49cf3a8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemusStealer


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: f86352ecaf34773e85d979220b9825f6c1ec45b5c93d5ecca9998dc2b49cf3a8
SHA3-384 hash: 34b7e157c6b26390686c787b8d678ba52659ca8b227c7fc1d589fbc0f203288b2792a917588efa71f1e5fe595d67ef02
SHA1 hash: 1f6eb84506c03de716e2af8239f050176287425d
MD5 hash: efad46229e0d2e757c9d98fce92cb50a
humanhash: winter-five-robin-aspen
File name:ProjectLoad.exe
Download: download sample
Signature RemusStealer
File size:67'582'173 bytes
First seen:2026-04-29 17:19:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e24e2b765a0ca8ebb142df10bd69ab5c (1 x RemusStealer)
ssdeep 1572864:VLdkjx5RYiCUdc6O4sdUWV99kbvCgrs4D6uSicJJyXT29lfuv:V2jxpnO9dUWV9ERrsy6uS92T29lfa
TLSH T190E733C8D50D9811E99765F2D7B938A8EF4D16C0C4FDC231A6A89F0EA05FDE14B4B863
TrID 39.7% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
21.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
8.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
8.3% (.EXE) Win64 Executable (generic) (6522/11/2)
6.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
dhash icon 0f3371cccc692917 (1 x RemusStealer)
Reporter aachum
Tags:exe fullsofts-org RemusStealer


Avatar
iamaachum
https://fullsofts.org/

Remus C2:
diggero.biz
31.97.61.212:8521
comples.biz
103.30.145.217:8768

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
ES ES
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
exe
Verdict:
No threats detected
Analysis date:
2026-04-29 17:23:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Sending a custom TCP request
Creating a process from a recently created file
Creating a window
Searching for synchronization primitives
Unauthorized injection to a recently created process
Loading a suspicious library
Running batch commands
Creating a process with a hidden window
Launching a process
Сreating synchronization primitives
Forced system process termination
Creating a file
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
DNS request
Connection attempt
Adding an access-denied ACE
Using the Windows Management Instrumentation requests
Sending a UDP request
Gathering data
Verdict:
Clean
File Type:
exe x32
First seen:
2026-05-01T11:58:00Z UTC
Last seen:
2026-05-01T12:08:00Z UTC
Hits:
~10
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
52 / 100
Signature
Drops large PE files
Unusual module load detection (module proxying)
Uses the Telegram API (likely for C&C communication)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1906433 Sample: ProjectLoad.exe Startdate: 29/04/2026 Architecture: WINDOWS Score: 52 43 api.telegram.org 2->43 45 ifconfig.me 2->45 47 api.ipify.org 2->47 55 Unusual module load detection (module proxying) 2->55 9 ProjectLoad.exe 78 2->9         started        signatures3 57 Uses the Telegram API (likely for C&C communication) 43->57 process4 file5 29 C:\Users\user\AppData\Local\...\vulkan-1.dll, PE32+ 9->29 dropped 31 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32+ 9->31 dropped 33 C:\Users\user\AppData\Local\...\elevate.exe, PE32 9->33 dropped 35 5 other files (none is malicious) 9->35 dropped 59 Drops large PE files 9->59 13 GitHub Files Installer.exe 44 9->13         started        signatures6 process7 dnsIp8 49 api.telegram.org 149.154.166.110, 443, 49713 TELEGRAMRU United Kingdom 13->49 51 api.ipify.org 172.67.74.152, 443, 49709 CLOUDFLARENETUS United States 13->51 53 ifconfig.me 34.160.111.145, 443, 49712 ATGS-MMD-ASUS United States 13->53 16 GitHub Files Installer.exe 21 13->16         started        19 cmd.exe 1 13->19         started        21 GitHub Files Installer.exe 1 13->21         started        23 2 other processes 13->23 process9 dnsIp10 37 cdn.jsdelivr.net.cdn.cloudflare.net 104.16.174.226, 443, 49706 CLOUDFLARENETUS United States 16->37 39 chrome.cloudflare-dns.com 162.159.61.3, 443, 49708, 49711 CLOUDFLARENETUS United States 16->39 41 2 other IPs or domains 16->41 25 tasklist.exe 1 19->25         started        27 conhost.exe 19->27         started        process11
Gathering data
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Windows directory
Enumerates processes with tasklist
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:telebot_framework
Author:vietdx.mb
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RemusStealer

Executable exe f86352ecaf34773e85d979220b9825f6c1ec45b5c93d5ecca9998dc2b49cf3a8

(this sample)

  
Delivery method
Distributed via web download

Comments