<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: THREAT CHAIN</title>
    <description>The latest articles on DEV Community by THREAT CHAIN (@threatchain).</description>
    <link>https://dev.to/threatchain</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3861535%2Fe18a3da9-c1ad-41f5-8328-665ce2b9d1b8.png</url>
      <title>DEV Community: THREAT CHAIN</title>
      <link>https://dev.to/threatchain</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/threatchain"/>
    <language>en</language>
    <item>
      <title>QuasarRAT Sample Detected: 7z2600-x32.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Sun, 10 May 2026 19:15:22 +0000</pubDate>
      <link>https://dev.to/threatchain/quasarrat-sample-detected-7z2600-x32exe-307p</link>
      <guid>https://dev.to/threatchain/quasarrat-sample-detected-7z2600-x32exe-307p</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/quasarrat-sample-detected-7z2600-x32-exe-00e6af4b" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;It's open-source on GitHub. It's also on thousands of infected machines right now, giving attackers full remote control.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new QuasarRAT sample was identified by threat intelligence feeds on 2026-05-10 18:14:01. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;00e6af4b4e3df4c09673e4492483f3cec7bb27b4565bdd112973fb4952ad897c&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;7z2600-x32.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;3.09 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;VN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-10 18:14:01&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;QuasarRAT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;botnet, c2, exe, QuasarRAT, trojan&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;58/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What QuasarRAT Does
&lt;/h2&gt;

&lt;p&gt;QuasarRAT is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. QuasarRAT samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'quasar', 'verdict': 'Malicious activity', 'file_name': '7z2600-x32.exe', 'date': '2026-04-19 07:02:32', 'analysis_url': 'https://app.any.run/tasks/4a244ab1-5983-4e32-b831-fc11499356b6', 'tags': ['quasar']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YOROI_YOMI&lt;/strong&gt;: &lt;code&gt;iSpy Keylogger&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;malicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CAPE&lt;/strong&gt;: &lt;code&gt;QuasarRAT&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;quasar&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'malicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '00e6af4b4e3df4c09673e4492483f3cec7bb27b4565bdd112973fb4952ad897c', 'md5_hash': 'cbf264674171a3810c737e31e851abe0', 'sha1_hash': 'abfd48110be614dba6217c534f2babe1c74ce454', 'detections': ['QuasarRAT'], 'link': 'https://www.unpac.me/results/adfb05e4-a907-4c44-9cc8-9fa2e47b9c81/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related QuasarRAT activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;00e6af4b4e3df4c09673e4492483f3cec7bb27b4565bdd112973fb4952ad897c&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;7z2600-x32.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: botnet, c2, exe, QuasarRAT, trojan&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: BLOWFISH_Constants, CP_Script_Inject_Detector, DetectEncryptedVariants, Detect_PowerShell_Obfuscation, FreddyBearDropper&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;00e6af4b4e3df4c09673e4492483f3cec7bb27b4565bdd112973fb4952ad897c&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;7z2600-x32.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — QuasarRAT typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. QuasarRAT frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. QuasarRAT is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/00e6af4b4e3df4c09673e4492483f3cec7bb27b4565bdd112973fb4952ad897c/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>quasarrat</category>
    </item>
    <item>
      <title>Cobalt Strike Sample Detected: 申请项目同行评议意见反馈信.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Sun, 10 May 2026 11:15:23 +0000</pubDate>
      <link>https://dev.to/threatchain/cobalt-strike-sample-detected-shen-qing-xiang-mu-tong-xing-ping-yi-yi-jian-fan-kui-xin-exe-2jn0</link>
      <guid>https://dev.to/threatchain/cobalt-strike-sample-detected-shen-qing-xiang-mu-tong-xing-ping-yi-yi-jian-fan-kui-xin-exe-2jn0</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/cobalt-strike-sample-detected-exe-d46e966d" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. Cobalt Strike is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Cobalt Strike sample was identified by threat intelligence feeds on 2026-05-10 05:20:49. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;d46e966d978515b900ae003dc3b56225199de590e62165bb073138935e9b4294&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;申请项目同行评议意见反馈信.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;4.60 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SG&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-10 05:20:49&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Cobalt Strike&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Cobalt Strike, CobaltStrike, exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;41/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Cobalt Strike Does
&lt;/h2&gt;

&lt;p&gt;Cobalt Strike is a legitimate penetration testing tool that has been widely cracked and abused by criminals for post-exploitation, lateral movement, and command-and-control operations. Its presence on a system is a strong indicator of a hands-on attacker.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Cobalt Strike samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'No threats detected', 'file_name': 'exe', 'date': '2026-05-10 05:23:10', 'analysis_url': 'https://app.any.run/tasks/d144e18c-3cd1-42f5-8f2b-ec9ef7fbfb14', 'tags': ['rust']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YOROI_YOMI&lt;/strong&gt;: &lt;code&gt;Malicious File&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;malicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': 'd46e966d978515b900ae003dc3b56225199de590e62165bb073138935e9b4294', 'md5_hash': '078b3ab17372d9f6568dae2be29393e1', 'sha1_hash': '0539bac46f6aeaa1910a54a24acde9f5e5a1ca5a', 'detections': [], 'link': 'https://www.unpac.me/results/2bdf51dc-e3a5-4aa9-859d-f4e37e18cbca/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Cobalt Strike activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;d46e966d978515b900ae003dc3b56225199de590e62165bb073138935e9b4294&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;申请项目同行评议意见反馈信.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: Cobalt Strike, CobaltStrike, exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: DebuggerCheck_&lt;em&gt;API, DebuggerCheck&lt;/em&gt;_QueryInfo, golang_bin_JCorn_CSC846, MD5_Constants, pe_detect_tls_callbacks&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;d46e966d978515b900ae003dc3b56225199de590e62165bb073138935e9b4294&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;申请项目同行评议意见反馈信.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Cobalt Strike typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Cobalt Strike frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Cobalt Strike is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/d46e966d978515b900ae003dc3b56225199de590e62165bb073138935e9b4294/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>cobaltstrike</category>
    </item>
    <item>
      <title>Vidar Sample Detected: file</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Sat, 09 May 2026 11:15:24 +0000</pubDate>
      <link>https://dev.to/threatchain/vidar-sample-detected-file-go0</link>
      <guid>https://dev.to/threatchain/vidar-sample-detected-file-go0</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/vidar-sample-detected-file-3339def7" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;That 'free software' download just exfiltrated every password, cookie, and autofill entry on your machine in under 5 seconds.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Vidar sample was identified by threat intelligence feeds on 2026-05-09 01:31:07. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;3339def7f554fc59bbf2658e323167188d579e379502f2c508c04bf3656a9e6e&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;file&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;213.5 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-09 01:31:07&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Vidar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;d52f85, dropped-by-Amadey, exe, upx, Vidar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;51/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Vidar Does
&lt;/h2&gt;

&lt;p&gt;Vidar is an information stealer derived from the Arkei family. It targets crypto wallets, 2FA backups, browser passwords, and session cookies — and it's often dropped by malvertising campaigns targeting users searching for popular software downloads.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Vidar samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'vidar', 'verdict': 'Malicious activity', 'file_name': 'exe', 'date': '2026-05-09 01:31:56', 'analysis_url': 'https://app.any.run/tasks/c12661d9-4c1e-4ca5-ac9b-732afbae9555', 'tags': ['vidar', 'stealer', 'upx']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YOROI_YOMI&lt;/strong&gt;: &lt;code&gt;Malicious File&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;suspicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;vidar&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '3339def7f554fc59bbf2658e323167188d579e379502f2c508c04bf3656a9e6e', 'md5_hash': '9929dd9b673b7531cffcf3da5324c8ae', 'sha1_hash': '28eda4d556e488009d6e9125d4eb3c0f60c1a553', 'detections': [], 'link': 'https://www.unpac.me/results/3343d26b-3e7c-4602-b054-d9e34b70889f/'}, {'sha256_hash': '3fa483f53405ca08a41ac9c0eae2d484b46001ea7df71c987dad848f3963e639', 'md5_hash': '4b73124cd33bafc506d102a316a63643', 'sha1_hash': 'b24c19e20a4f055da39294652560004169765a8c', 'detections': [], 'link': 'https://www.unpac.me/results/3343d26b-3e7c-4602-b054-d9e34b70889f/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Vidar activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;3339def7f554fc59bbf2658e323167188d579e379502f2c508c04bf3656a9e6e&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;file&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: d52f85, dropped-by-Amadey, exe, upx, Vidar&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: CP_Script_Inject_Detector, DebuggerCheck_&lt;em&gt;API, DebuggerCheck&lt;/em&gt;&lt;em&gt;QueryInfo, DebuggerCheck&lt;/em&gt;&lt;em&gt;RemoteAPI, DebuggerHiding&lt;/em&gt;_Active&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;3339def7f554fc59bbf2658e323167188d579e379502f2c508c04bf3656a9e6e&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;file&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Vidar typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Vidar frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Vidar is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/3339def7f554fc59bbf2658e323167188d579e379502f2c508c04bf3656a9e6e/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>vidar</category>
    </item>
    <item>
      <title>AsyncRAT Sample Detected: Telegram (1).exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Fri, 08 May 2026 19:15:14 +0000</pubDate>
      <link>https://dev.to/threatchain/asyncrat-sample-detected-telegram-1exe-4b7i</link>
      <guid>https://dev.to/threatchain/asyncrat-sample-detected-telegram-1exe-4b7i</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/asyncrat-sample-detected-telegram-1-exe-103bf7cd" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Open-source. Free. And in the hands of thousands of attackers who use it to watch your every move through your own webcam.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new AsyncRAT sample was identified by threat intelligence feeds on 2026-05-08 17:59:02. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;103bf7cda93749567f7e16e48cd205fd059fdda7f7396a781c6e4a096a3b47d7&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Telegram (1).exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;112.0 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;VN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-08 17:59:02&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;AsyncRAT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;AsyncRAT, c2, dcrat, exe, rat, windows&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;53/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What AsyncRAT Does
&lt;/h2&gt;

&lt;p&gt;AsyncRAT is an open-source remote access trojan that criminals have endlessly modified and reused. It provides persistent remote control, credential theft, and the ability to deploy additional payloads. Because the source code is public, defenders see constant variants that evade signature-based detection.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. AsyncRAT samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'asyncrat', 'verdict': 'Malicious activity', 'file_name': '_103bf7cda93749567f7e16e48cd205fd059fdda7f7396a781c6e4a096a3b47d7.exe', 'date': '2026-05-08 18:00:36', 'analysis_url': 'https://app.any.run/tasks/b7e29424-a134-4d5d-87da-640a0660b5ce', 'tags': ['auto-reg', 'asyncrat', 'rat']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CERT-PL_MWDB&lt;/strong&gt;: &lt;code&gt;asyncrat&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;malicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;asyncrat&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '103bf7cda93749567f7e16e48cd205fd059fdda7f7396a781c6e4a096a3b47d7', 'md5_hash': 'b669f2d36b0b71f614751ed3c4486c0b', 'sha1_hash': 'd93d360643cd95ca8b2f2bbcf61b2fec5dc208f0', 'detections': ['win_asyncrat_w0', 'AsyncRAT'], 'link': 'https://www.unpac.me/results/2ea0565e-83d4-4435-aafc-783f730cef69/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;NotCategorized&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related AsyncRAT activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;103bf7cda93749567f7e16e48cd205fd059fdda7f7396a781c6e4a096a3b47d7&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;Telegram (1).exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: AsyncRAT, c2, dcrat, exe, rat, windows&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: AsyncRat, asyncrat, AsyncRAT_057B, asyncrat_kingrat, DebuggerCheck__RemoteAPI&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;103bf7cda93749567f7e16e48cd205fd059fdda7f7396a781c6e4a096a3b47d7&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;Telegram (1).exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — AsyncRAT typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. AsyncRAT frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. AsyncRAT is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/103bf7cda93749567f7e16e48cd205fd059fdda7f7396a781c6e4a096a3b47d7/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>asyncrat</category>
    </item>
    <item>
      <title>RemcosRAT Sample Detected: DHL Shipment Details.xls</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Fri, 08 May 2026 11:15:24 +0000</pubDate>
      <link>https://dev.to/threatchain/remcosrat-sample-detected-dhl-shipment-detailsxls-2373</link>
      <guid>https://dev.to/threatchain/remcosrat-sample-detected-dhl-shipment-detailsxls-2373</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/remcosrat-sample-detected-dhl-shipment-details-xls-25c3bd32" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;For $58 on a hacking forum, anyone can buy full remote control of your computer. Camera, keyboard, files — everything.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new RemcosRAT sample was identified by threat intelligence feeds on 2026-05-08 09:56:04. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;25c3bd326e331a73559179092b5d981361dbc693dea7ee098dd4e279f56e084e&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;DHL Shipment Details.xls&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;xls&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;284.0 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SE&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-08 09:56:04&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;RemcosRAT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;DHL, RemcosRAT, xls&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;14/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What RemcosRAT Does
&lt;/h2&gt;

&lt;p&gt;RemcosRAT is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. RemcosRAT samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'No threats detected', 'file_name': '_25c3bd326e331a73559179092b5d981361dbc693dea7ee098dd4e279f56e084e.xls', 'date': '2026-05-08 10:00:43', 'analysis_url': 'https://app.any.run/tasks/98f7db21-35fa-41d2-aaef-a1c053f42bf6', 'tags': ['ole-embedded']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CERT-PL_MWDB&lt;/strong&gt;: &lt;code&gt;remcos&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YOROI_YOMI&lt;/strong&gt;: &lt;code&gt;Malicious File&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;InQuest&lt;/strong&gt;: &lt;code&gt;SUSPICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;DocGuard&lt;/strong&gt;: &lt;code&gt;Malicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related RemcosRAT activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;25c3bd326e331a73559179092b5d981361dbc693dea7ee098dd4e279f56e084e&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;DHL Shipment Details.xls&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: xls&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: DHL, RemcosRAT, xls&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: FreddyBearDropper, informational_win_ole_exist, informational_win_ole_protected, XLS_STRINGS&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;25c3bd326e331a73559179092b5d981361dbc693dea7ee098dd4e279f56e084e&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;DHL Shipment Details.xls&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — RemcosRAT typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. RemcosRAT frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. RemcosRAT is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/25c3bd326e331a73559179092b5d981361dbc693dea7ee098dd4e279f56e084e/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>remcosrat</category>
    </item>
    <item>
      <title>Amadey Sample Detected: file</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Thu, 07 May 2026 19:15:27 +0000</pubDate>
      <link>https://dev.to/threatchain/amadey-sample-detected-file-52h5</link>
      <guid>https://dev.to/threatchain/amadey-sample-detected-file-52h5</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/amadey-sample-detected-file-527c99c6" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;It doesn't steal your data — it opens the door for everything else. Ransomware, stealers, miners. This loader delivers them all.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Amadey sample was identified by threat intelligence feeds on 2026-05-07 17:01:34. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;527c99c63beca1735ed785e3907aa7c88a467453a4a55f808400e8e402e6cbe3&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;file&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;510.0 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-07 17:01:34&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Amadey&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Amadey, d52f85, dropped-by-Amadey, exe, upx&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;24/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Amadey Does
&lt;/h2&gt;

&lt;p&gt;Amadey is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Amadey samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'vidar', 'verdict': 'Malicious activity', 'file_name': '_527c99c63beca1735ed785e3907aa7c88a467453a4a55f808400e8e402e6cbe3.exe', 'date': '2026-05-07 17:03:09', 'analysis_url': 'https://app.any.run/tasks/95566d15-b71f-4349-9305-5e261df0f070', 'tags': ['stealer', 'stealc', 'vidar', 'upx', 'amadey', 'botnet', 'loader']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;clean2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;suspicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '527c99c63beca1735ed785e3907aa7c88a467453a4a55f808400e8e402e6cbe3', 'md5_hash': 'ca856cc447d9176973ed01fb3cd8bbe9', 'sha1_hash': '107d0b261a92d98dc75d0b6bdd2a58293936ab1f', 'detections': [], 'link': 'https://www.unpac.me/results/d347ce89-e9e0-4fcb-8cef-99a852679ba7/'}, {'sha256_hash': 'f4e29cc8122b6bc3bd14910eae33c15b60059a4ba6145eebdb59090649e07fb0', 'md5_hash': '6560523a5f58a5ec460399be504365bb', 'sha1_hash': 'a78993894b694dc64b235fcd416071efbe4c8a1e', 'detections': [], 'link': 'https://www.unpac.me/results/d347ce89-e9e0-4fcb-8cef-99a852679ba7/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;Amadey,Vidar&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;LIKELY_MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;NoThreats&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Amadey activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;527c99c63beca1735ed785e3907aa7c88a467453a4a55f808400e8e402e6cbe3&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;file&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: Amadey, d52f85, dropped-by-Amadey, exe, upx&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: CP_Script_Inject_Detector, DebuggerCheck_&lt;em&gt;QueryInfo, DebuggerCheck&lt;/em&gt;&lt;em&gt;QueryInfo, DebuggerHiding&lt;/em&gt;&lt;em&gt;Thread, DebuggerHiding&lt;/em&gt;_Thread&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;527c99c63beca1735ed785e3907aa7c88a467453a4a55f808400e8e402e6cbe3&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;file&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Amadey typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Amadey frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Amadey is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/527c99c63beca1735ed785e3907aa7c88a467453a4a55f808400e8e402e6cbe3/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>amadey</category>
    </item>
    <item>
      <title>NanoCore Sample Detected: ee88.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Thu, 07 May 2026 11:15:25 +0000</pubDate>
      <link>https://dev.to/threatchain/nanocore-sample-detected-ee88exe-1e8j</link>
      <guid>https://dev.to/threatchain/nanocore-sample-detected-ee88exe-1e8j</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/nanocore-sample-detected-ee88-exe-884f2bd8" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;An attacker is reading your keystrokes, watching your screen, and downloading your files. The RAT that infected you cost $25.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new NanoCore sample was identified by threat intelligence feeds on 2026-05-07 10:00:06. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;884f2bd859993831630eaabc84cce99724c18c400f8be768d04c346ba9561474&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;ee88.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;203.0 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;NL&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-07 10:00:06&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;NanoCore&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe, NanoCore, RAT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;58/74 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What NanoCore Does
&lt;/h2&gt;

&lt;p&gt;NanoCore is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. NanoCore samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'nanocore', 'verdict': 'Malicious activity', 'file_name': 'ee88.exe', 'date': '2026-05-06 13:40:52', 'analysis_url': 'https://app.any.run/tasks/e4a0c959-655a-4597-8c1c-7e37dda6fd62', 'tags': ['auto-reg', 'auto-sch-xml', 'nanocore', 'rat', 'remote']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CERT-PL_MWDB&lt;/strong&gt;: &lt;code&gt;nanocore&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YOROI_YOMI&lt;/strong&gt;: &lt;code&gt;Malicious File&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;malicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CAPE&lt;/strong&gt;: &lt;code&gt;NanoCore&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;nanocore&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'malicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '884f2bd859993831630eaabc84cce99724c18c400f8be768d04c346ba9561474', 'md5_hash': 'e4895511882e8067988b625910c093f5', 'sha1_hash': '07a15262a12702f36c23c4ca812318e13a138277', 'detections': ['win_nanocore_w0', 'triage_nanocore_rat'], 'link': 'https://www.unpac.me/results/a2085ccc-4e22-4300-81b3-5591ad0fa216/'}, {'sha256_hash': '61e9d5c0727665e9ef3f328141397be47c65ed11ab621c644b5bbf1d67138403', 'md5_hash': 'bdc8945f1d799c845408522e372d1dbd', 'sha1_hash': '874b7c3c97cc5b13b9dd172fec5a54bc1f258005', 'detections': ['triage_nanocore_rat'], 'link': 'https://www.unpac.me/results/a2085ccc-4e22-4300-81b3-5591ad0fa216/'}, {'sha256_hash': '01e3b18bd63981decb384f558f0321346c3334bb6e6f97c31c6c95c4ab2fe354', 'md5_hash': '9c8242440c47a4f1ce2e47df3c3ddd28', 'sha1_hash': '874f3caf663265f7dd18fb565d91b7d915031251', 'detections': ['triage_nanocore_rat'], 'link': 'https://www.unpac.me/results/a2085ccc-4e22-4300-81b3-5591ad0fa216/'}, {'sha256_hash': 'f9b8c3f31375e9a1ec105f930f751869a804110d29d6b38e7298622eb74b2bec', 'md5_hash': '42006852619847f368bc4062849cd6dc', 'sha1_hash': 'ba6edc3a5aba8eac15b6a30e1407cdae80b2481d', 'detections': [], 'link': 'https://www.unpac.me/results/a2085ccc-4e22-4300-81b3-5591ad0fa216/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;NanoCore&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related NanoCore activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;884f2bd859993831630eaabc84cce99724c18c400f8be768d04c346ba9561474&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;ee88.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: exe, NanoCore, RAT&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: ach_NanoCore, malware_Nanocore_strings, MALWARE_Win_NanoCore, Nanocore, nanocore_rat&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;884f2bd859993831630eaabc84cce99724c18c400f8be768d04c346ba9561474&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;ee88.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — NanoCore typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. NanoCore frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. NanoCore is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/884f2bd859993831630eaabc84cce99724c18c400f8be768d04c346ba9561474/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>nanocore</category>
    </item>
    <item>
      <title>Formbook Sample Detected: Purchase Order 350088.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Wed, 06 May 2026 11:15:25 +0000</pubDate>
      <link>https://dev.to/threatchain/formbook-sample-detected-purchase-order-350088exe-157o</link>
      <guid>https://dev.to/threatchain/formbook-sample-detected-purchase-order-350088exe-157o</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/formbook-sample-detected-purchase-order-350088-exe-ead0a612" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Someone on your team opened an Excel file 10 minutes ago. Their browser passwords, email credentials, and keystrokes are already being sent to a server in Eastern Europe.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Formbook sample was identified by threat intelligence feeds on 2026-05-06 09:07:33. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;ead0a612c58e858cabd1248aca1ee32fa8d5e5a290bda6771bdc53e500140b12&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Purchase Order 350088.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;1.12 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;DE&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-06 09:07:33&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Formbook&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe, Formbook&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;29/74 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Formbook Does
&lt;/h2&gt;

&lt;p&gt;Formbook is a credential-stealing trojan that hooks browser APIs to capture passwords, form submissions, and clipboard contents. It's been active since 2016 and continues to evolve, with recent campaigns using fake invoice and purchase order lures.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Formbook samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'Malicious activity', 'file_name': 'PurchaseOrder350088.exe', 'date': '2026-05-06 09:11:02', 'analysis_url': 'https://app.any.run/tasks/b31b2eeb-564b-451d-938b-9fb2eed8ce46', 'tags': ['auto-reg']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YOROI_YOMI&lt;/strong&gt;: &lt;code&gt;Malicious File&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;suspicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CAPE&lt;/strong&gt;: &lt;code&gt;Formbook&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': 'ead0a612c58e858cabd1248aca1ee32fa8d5e5a290bda6771bdc53e500140b12', 'md5_hash': '3c3d4e6dd0c27c1e623c198f7ecf2163', 'sha1_hash': '4397efc638c80dd6ab2ea8430793a4b7a047c402', 'detections': [], 'link': 'https://www.unpac.me/results/822dba64-8ee1-46d1-84a8-92d0ec8e347f/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;FormBook&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Formbook activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;ead0a612c58e858cabd1248aca1ee32fa8d5e5a290bda6771bdc53e500140b12&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;Purchase Order 350088.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: exe, Formbook&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: CP_Script_Inject_Detector, DebuggerCheck_&lt;em&gt;GlobalFlags, DebuggerCheck&lt;/em&gt;&lt;em&gt;QueryInfo, DebuggerHiding&lt;/em&gt;&lt;em&gt;Active, DebuggerHiding&lt;/em&gt;_Thread&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;ead0a612c58e858cabd1248aca1ee32fa8d5e5a290bda6771bdc53e500140b12&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;Purchase Order 350088.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Formbook typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Formbook frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Formbook is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/ead0a612c58e858cabd1248aca1ee32fa8d5e5a290bda6771bdc53e500140b12/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>formbook</category>
    </item>
    <item>
      <title>Mirai Sample Detected: luxzz.mpsl</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Tue, 05 May 2026 19:15:13 +0000</pubDate>
      <link>https://dev.to/threatchain/mirai-sample-detected-luxzzmpsl-2150</link>
      <guid>https://dev.to/threatchain/mirai-sample-detected-luxzzmpsl-2150</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/mirai-sample-detected-luxzz-mpsl-1a8d5043" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your home router might be attacking websites right now and you'd never know. Millions are already compromised.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Mirai sample was identified by threat intelligence feeds on 2026-05-05 17:45:50. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;1a8d5043cc77d05834d1b64b4a86d8db66ba5a79a23c6778d8f6b1c8b8de46f1&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;luxzz.mpsl&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;elf&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;50.2 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;DE&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-05 17:45:50&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Mirai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;elf, Mirai, upx&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;30/74 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Mirai Does
&lt;/h2&gt;

&lt;p&gt;Mirai is a family of IoT botnets that spread by brute-forcing default credentials on routers, cameras, and other embedded devices. Infected devices are typically used to launch DDoS attacks or as proxies for other criminal activity.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Mirai samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;unknown&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;mirai&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;LIKELY_MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Mirai activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;1a8d5043cc77d05834d1b64b4a86d8db66ba5a79a23c6778d8f6b1c8b8de46f1&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;luxzz.mpsl&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: elf&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: elf, Mirai, upx&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: linux_generic_ipv6_catcher, SUSP_ELF_LNX_UPX_Compressed_File, TH_Generic_MassHunt_Linux_Malware_2026_CYFARE, upx_packed_elf_v1&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;1a8d5043cc77d05834d1b64b4a86d8db66ba5a79a23c6778d8f6b1c8b8de46f1&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;luxzz.mpsl&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Mirai typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Mirai frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Mirai is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/1a8d5043cc77d05834d1b64b4a86d8db66ba5a79a23c6778d8f6b1c8b8de46f1/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>mirai</category>
    </item>
    <item>
      <title>PhantomStealer Sample Detected: PO 283974863 -R0-S - 0908273.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Tue, 05 May 2026 11:15:21 +0000</pubDate>
      <link>https://dev.to/threatchain/phantomstealer-sample-detected-po-283974863-r0-s-0908273exe-9jo</link>
      <guid>https://dev.to/threatchain/phantomstealer-sample-detected-po-283974863-r0-s-0908273exe-9jo</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/phantomstealer-sample-detected-po-283974863-r0-s-0908273-exe-790945e1" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. PhantomStealer is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new PhantomStealer sample was identified by threat intelligence feeds on 2026-05-05 09:45:15. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;790945e17a51691483455a11af2efcbe15f2b473b65b151f50287623d1468516&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;PO 283974863 -R0-S - 0908273.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;1.46 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;CH&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-05 09:45:15&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;PhantomStealer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe, PhantomStealer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;30/74 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What PhantomStealer Does
&lt;/h2&gt;

&lt;p&gt;PhantomStealer is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. PhantomStealer samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'Malicious activity', 'file_name': 'exe', 'date': '2026-05-05 09:46:56', 'analysis_url': 'https://app.any.run/tasks/5dd132d8-7f38-4c18-a2d4-5853a62b501e', 'tags': ['auto-reg', 'stealer', 'phantom', 'evasion']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;suspicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;phantom_stealer&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '790945e17a51691483455a11af2efcbe15f2b473b65b151f50287623d1468516', 'md5_hash': 'e1faeb1fac915fb6c11273d220e7b11f', 'sha1_hash': '5ad3f0d0d8e0276dad0b1cc64aee36774db5543f', 'detections': [], 'link': 'https://www.unpac.me/results/63119f9d-581b-4166-bf5c-965285d9d7f2/'}, {'sha256_hash': '811859dcfc426727c9aaba5c18a50e81d14239cc66356535f51231af21a2fc4b', 'md5_hash': '85a88d1e4cd3423cd1127eb23baad1fa', 'sha1_hash': '080362d496998d60cb2ea0fcde11ffcb7f408db2', 'detections': [], 'link': 'https://www.unpac.me/results/63119f9d-581b-4166-bf5c-965285d9d7f2/'}, {'sha256_hash': '50b044fdf6ef68f9c4651f2058b889e7199ed9882342e5fbcb65c0372fc3498b', 'md5_hash': 'e741b14e6d5b9cb132b29d72e45deba1', 'sha1_hash': '4cd3be0545d2cd03bc177e017ebc29b544cc4d2e', 'detections': [], 'link': 'https://www.unpac.me/results/63119f9d-581b-4166-bf5c-965285d9d7f2/'}, {'sha256_hash': 'e10168e38bb5641a19bf4e5986d3ffc91aaefa1afe8cb781d14ce7e1b9090fd8', 'md5_hash': '07957d2377f93fd60bf885babf36295e', 'sha1_hash': 'daa46928a7a8542f59a3b4fb5558689a09f6ad3a', 'detections': ['phantom_stealer'], 'link': 'https://www.unpac.me/results/63119f9d-581b-4166-bf5c-965285d9d7f2/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;PhantomStealer&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;LIKELY_MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related PhantomStealer activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;790945e17a51691483455a11af2efcbe15f2b473b65b151f50287623d1468516&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;PO 283974863 -R0-S - 0908273.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: exe, PhantomStealer&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: NET, NETexecutableMicrosoft, pe_imphash, Skystars_Malware_Imphash&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;790945e17a51691483455a11af2efcbe15f2b473b65b151f50287623d1468516&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;PO 283974863 -R0-S - 0908273.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — PhantomStealer typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. PhantomStealer frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. PhantomStealer is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/790945e17a51691483455a11af2efcbe15f2b473b65b151f50287623d1468516/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>phantomstealer</category>
    </item>
    <item>
      <title>XoriumStealer Sample Detected: file</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 04 May 2026 19:15:23 +0000</pubDate>
      <link>https://dev.to/threatchain/xoriumstealer-sample-detected-file-206e</link>
      <guid>https://dev.to/threatchain/xoriumstealer-sample-detected-file-206e</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/xoriumstealer-sample-detected-file-5c799922" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. XoriumStealer is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new XoriumStealer sample was identified by threat intelligence feeds on 2026-05-04 17:46:19. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;5c799922f4e11ec30bbb60e39868b9d1892a681ff553c1da8df4bd0405e7374e&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;file&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;99.5 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-04 17:46:19&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;XoriumStealer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;dropped-by-GCleaner, exe, G, US.file, XoriumStealer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;17/74 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What XoriumStealer Does
&lt;/h2&gt;

&lt;p&gt;XoriumStealer is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. XoriumStealer samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'connectwise', 'verdict': 'Malicious activity', 'file_name': '_5c799922f4e11ec30bbb60e39868b9d1892a681ff553c1da8df4bd0405e7374e.exe', 'date': '2026-05-04 17:48:01', 'analysis_url': 'https://app.any.run/tasks/a68d45fb-bb22-4140-b4d7-f134c930dcde', 'tags': ['github', 'screenconnect', 'remote', 'loader', 'rmm-tool', 'uac', 'tool', 'auto-sch', 'connectwise', 'pulsar', 'rat', 'stealer']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;unknown&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;xorium_stealer&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '5c799922f4e11ec30bbb60e39868b9d1892a681ff553c1da8df4bd0405e7374e', 'md5_hash': 'bdbe6fe4acf7401e4f5807dda77a58e9', 'sha1_hash': '752f4292e6ab01836034ce7f80df53cf7bc12d64', 'detections': [], 'link': 'https://www.unpac.me/results/ae360181-323c-4943-86f4-8d0791fb4f93/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;ScreenConnect,QuasarRAT,ReflectiveLoader,XoriumStealer&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;LIKELY_MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;NotCategorized&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related XoriumStealer activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;5c799922f4e11ec30bbb60e39868b9d1892a681ff553c1da8df4bd0405e7374e&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;file&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: dropped-by-GCleaner, exe, G, US.file, XoriumStealer&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: detect_powershell, Detect_PowerShell_Obfuscation, NETexecutableMicrosoft, pe_imphash, Skystars_Malware_Imphash&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;5c799922f4e11ec30bbb60e39868b9d1892a681ff553c1da8df4bd0405e7374e&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;file&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — XoriumStealer typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. XoriumStealer frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. XoriumStealer is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/5c799922f4e11ec30bbb60e39868b9d1892a681ff553c1da8df4bd0405e7374e/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>xoriumstealer</category>
    </item>
    <item>
      <title>GuLoader Sample Detected: Purchase Order.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 04 May 2026 11:15:25 +0000</pubDate>
      <link>https://dev.to/threatchain/guloader-sample-detected-purchase-orderexe-63c</link>
      <guid>https://dev.to/threatchain/guloader-sample-detected-purchase-orderexe-63c</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/guloader-sample-detected-purchase-order-exe-8f4a618b" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. GuLoader is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new GuLoader sample was identified by threat intelligence feeds on 2026-05-04 08:39:59. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;8f4a618be0b59f1156fb4b17347182412e54fc962360aab89e6e8b2e86f6605a&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Purchase Order.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;773.3 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;DE&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-05-04 08:39:59&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;GuLoader&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe, exe-in-archive, GuLoader, spamtrap&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;26/74 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What GuLoader Does
&lt;/h2&gt;

&lt;p&gt;GuLoader is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. GuLoader samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'remcos', 'verdict': 'Malicious activity', 'file_name': 'exe', 'date': '2026-05-04 08:42:21', 'analysis_url': 'https://app.any.run/tasks/f76d591d-0c99-4a9b-8c4f-601d0b054a3b', 'tags': ['rat', 'remcos', 'auto-reg', 'remote', 'stealer']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;clean2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;unknown&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CAPE&lt;/strong&gt;: &lt;code&gt;Guloader&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;remcos&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '8f4a618be0b59f1156fb4b17347182412e54fc962360aab89e6e8b2e86f6605a', 'md5_hash': '7d36e3d651081068f10b68870a46ce91', 'sha1_hash': '948acc5852f6a437bbba030e0c970756d340974b', 'detections': [], 'link': 'https://www.unpac.me/results/28aee1a5-25fc-4d63-96a5-13d2103350f7/'}, {'sha256_hash': '8b4c47c4cf5e76ec57dd5a050d5acd832a0d532ee875d7b44f6cdaf68f90d37c', 'md5_hash': '9b38a1b07a0ebc5c7e59e63346ecc2db', 'sha1_hash': '97332a2ffcf12a3e3f27e7c05213b5d7faa13735', 'detections': [], 'link': 'https://www.unpac.me/results/28aee1a5-25fc-4d63-96a5-13d2103350f7/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;GuLoader&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related GuLoader activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;8f4a618be0b59f1156fb4b17347182412e54fc962360aab89e6e8b2e86f6605a&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;Purchase Order.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: exe, exe-in-archive, GuLoader, spamtrap&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: Detect_NSIS_Nullsoft_Installer, VECT_Ransomware&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;8f4a618be0b59f1156fb4b17347182412e54fc962360aab89e6e8b2e86f6605a&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;Purchase Order.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — GuLoader typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. GuLoader frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. GuLoader is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/8f4a618be0b59f1156fb4b17347182412e54fc962360aab89e6e8b2e86f6605a/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>guloader</category>
    </item>
  </channel>
</rss>
