<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: THREAT CHAIN</title>
    <description>The latest articles on Forem by THREAT CHAIN (@threatchain).</description>
    <link>https://forem.com/threatchain</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3861535%2Fe18a3da9-c1ad-41f5-8328-665ce2b9d1b8.png</url>
      <title>Forem: THREAT CHAIN</title>
      <link>https://forem.com/threatchain</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/threatchain"/>
    <language>en</language>
    <item>
      <title>CountLoader Sample Detected: cx-programmer 9.1 free download full.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Wed, 29 Apr 2026 19:15:23 +0000</pubDate>
      <link>https://forem.com/threatchain/countloader-sample-detected-cx-programmer-91-free-download-fullexe-4npm</link>
      <guid>https://forem.com/threatchain/countloader-sample-detected-cx-programmer-91-free-download-fullexe-4npm</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/countloader-sample-detected-cx-programmer-9-1-free-download-full-exe-a3d56515" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. CountLoader is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new CountLoader sample was identified by threat intelligence feeds on 2026-04-29 17:13:35. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;a3d5651526901f3b2752ec485b840b8dc5cc4fce872d5c19d795be9be255fde7&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;cx-programmer 9.1 free download full.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2.23 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;NL&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-29 17:13:35&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;CountLoader&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;CountLoader, de-pumped, exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;26/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What CountLoader Does
&lt;/h2&gt;

&lt;p&gt;CountLoader is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. CountLoader samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'Malicious activity', 'file_name': 'exe', 'date': '2026-04-29 17:15:40', 'analysis_url': 'https://app.any.run/tasks/a33dfad4-367c-45cd-8804-eece0c41378c', 'tags': ['lumma', 'stealer', 'fingerprinting', 'golang']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;unknown&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;lumma&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': 'a3d5651526901f3b2752ec485b840b8dc5cc4fce872d5c19d795be9be255fde7', 'md5_hash': '5ac1f7bb6b5280f344bd10d1be424a94', 'sha1_hash': '999efe2b1a3f7d15e38395387cc13d2ebd5718a7', 'detections': [], 'link': 'https://www.unpac.me/results/65197c30-4047-4b00-83a7-47b73b0a418a/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;Lumma&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;NoThreats&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related CountLoader activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;a3d5651526901f3b2752ec485b840b8dc5cc4fce872d5c19d795be9be255fde7&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;cx-programmer 9.1 free download full.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: CountLoader, de-pumped, exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: command_and_control, CP_Script_Inject_Detector, DebuggerException__SetConsoleCtrl, DetectGoMethodSignatures, GoBinTest&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;a3d5651526901f3b2752ec485b840b8dc5cc4fce872d5c19d795be9be255fde7&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;cx-programmer 9.1 free download full.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — CountLoader typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. CountLoader frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. CountLoader is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/a3d5651526901f3b2752ec485b840b8dc5cc4fce872d5c19d795be9be255fde7/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>countloader</category>
    </item>
    <item>
      <title>ConnectWise Sample Detected: support.client.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Wed, 29 Apr 2026 11:15:14 +0000</pubDate>
      <link>https://forem.com/threatchain/connectwise-sample-detected-supportclientexe-bbb</link>
      <guid>https://forem.com/threatchain/connectwise-sample-detected-supportclientexe-bbb</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/connectwise-sample-detected-support-client-exe-7b382d57" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. ConnectWise is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new ConnectWise sample was identified by threat intelligence feeds on 2026-04-29 10:01:20. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;7b382d57978651b5a3a03d91ceafab42c79b4cc690c7e520f7fce3af19b735b9&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;support.client.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;305.2 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SK&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-29 10:01:20&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;ConnectWise&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;ConnectWise, signed&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;17/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What ConnectWise Does
&lt;/h2&gt;

&lt;p&gt;ConnectWise is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. ConnectWise samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'No threats detected', 'file_name': 'support.client.exe', 'date': '2026-04-29 10:04:37', 'analysis_url': 'https://app.any.run/tasks/5f2e6387-8048-41c5-9a4f-78d0f16b271d', 'tags': []}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YOROI_YOMI&lt;/strong&gt;: &lt;code&gt;Malicious File&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;suspicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '7b382d57978651b5a3a03d91ceafab42c79b4cc690c7e520f7fce3af19b735b9', 'md5_hash': 'af7a84aeb3d1ef5b2c4feae1669a1044', 'sha1_hash': '089ca3483f51ee4973659b0e6a5d5c495502de37', 'detections': [], 'link': 'https://www.unpac.me/results/e13baee9-50b7-4af0-b9ab-252587596d33/'}, {'sha256_hash': 'a665adf1acd014984b818f95699c2205e9e9f7cc10031d5fa52260154004ba9b', 'md5_hash': 'c7dd4bcf2bdb96e081db2941f13f8154', 'sha1_hash': 'd7044c4ef07e59cf5e304be00502ea8218cb9297', 'detections': [], 'link': 'https://www.unpac.me/results/e13baee9-50b7-4af0-b9ab-252587596d33/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;LIKELY_MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Adware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related ConnectWise activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;7b382d57978651b5a3a03d91ceafab42c79b4cc690c7e520f7fce3af19b735b9&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;support.client.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: ConnectWise, signed&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: Check_OutputDebugStringA_iat, DebuggerCheck_&lt;em&gt;API, DebuggerException&lt;/em&gt;_SetConsoleCtrl, golang_bin_JCorn_CSC846, INDICATOR_RMM_ConnectWise_ScreenConnect_CERT&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;7b382d57978651b5a3a03d91ceafab42c79b4cc690c7e520f7fce3af19b735b9&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;support.client.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — ConnectWise typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. ConnectWise frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. ConnectWise is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/7b382d57978651b5a3a03d91ceafab42c79b4cc690c7e520f7fce3af19b735b9/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>connectwise</category>
    </item>
    <item>
      <title>Mirai Sample Detected: arm64</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Tue, 28 Apr 2026 19:15:11 +0000</pubDate>
      <link>https://forem.com/threatchain/mirai-sample-detected-arm64-41hb</link>
      <guid>https://forem.com/threatchain/mirai-sample-detected-arm64-41hb</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/mirai-sample-detected-arm64-350d214b" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your home router might be attacking websites right now and you'd never know. Millions are already compromised.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Mirai sample was identified by threat intelligence feeds on 2026-04-28 17:36:10. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;350d214b2d2e56594971c027f4cb78ff333553e2f355e5b166f67f8bf68564eb&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;arm64&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;elf&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;5.38 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;DE&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-28 17:36:10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Mirai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;elf, Mirai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;9/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Mirai Does
&lt;/h2&gt;

&lt;p&gt;Mirai is a family of IoT botnets that spread by brute-forcing default credentials on routers, cameras, and other embedded devices. Infected devices are typically used to launch DDoS attacks or as proxies for other criminal activity.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Mirai samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CERT-PL_MWDB&lt;/strong&gt;: &lt;code&gt;mirai&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware1&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;not_supported&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;NotCategorized&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Mirai activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;350d214b2d2e56594971c027f4cb78ff333553e2f355e5b166f67f8bf68564eb&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;arm64&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: elf&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: elf, Mirai&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: CP_Script_Inject_Detector, DetectEncryptedVariants, DetectGoMethodSignatures, Detect_Go_GOMAXPROCS, enterpriseapps2&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;350d214b2d2e56594971c027f4cb78ff333553e2f355e5b166f67f8bf68564eb&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;arm64&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Mirai typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Mirai frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Mirai is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/350d214b2d2e56594971c027f4cb78ff333553e2f355e5b166f67f8bf68564eb/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>mirai</category>
    </item>
    <item>
      <title>AsyncRAT Sample Detected: 8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Tue, 28 Apr 2026 11:16:24 +0000</pubDate>
      <link>https://forem.com/threatchain/asyncrat-sample-detected-8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a-2gie</link>
      <guid>https://forem.com/threatchain/asyncrat-sample-detected-8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a-2gie</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/asyncrat-sample-detected-8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4b-8a87aae3" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Open-source. Free. And in the hands of thousands of attackers who use it to watch your every move through your own webcam.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new AsyncRAT sample was identified by threat intelligence feeds on 2026-04-28 10:21:27. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;6.19 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;IT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-28 10:21:27&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;AsyncRAT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;AsyncRAT, exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;59/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What AsyncRAT Does
&lt;/h2&gt;

&lt;p&gt;AsyncRAT is an open-source remote access trojan that criminals have endlessly modified and reused. It provides persistent remote control, credential theft, and the ability to deploy additional payloads. Because the source code is public, defenders see constant variants that evade signature-based detection.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. AsyncRAT samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'andromeda', 'verdict': 'Malicious activity', 'file_name': 'https://coloursofthesky.online/crosshairxxxxxs', 'date': '2026-04-25 19:51:29', 'analysis_url': 'https://app.any.run/tasks/fc96f78c-961a-45d0-b838-e5f72dcc532e', 'tags': ['andromeda', 'botnet', 'gamarue', 'telegram', 'arch-exec', 'xworm', 'remote']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;malicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CAPE&lt;/strong&gt;: &lt;code&gt;XWorm&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;xworm&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a', 'md5_hash': '5d7c38a454572e068141a98991b4ac42', 'sha1_hash': '9fa3cebe7b49f2412a0d618e82c461fa5e2bcd0b', 'detections': ['win_xworm_a0', 'win_xworm_w0', 'triage_xworm_rat'], 'link': 'https://www.unpac.me/results/4a34d5ec-d0dd-4f81-94a4-751312781404/'}, {'sha256_hash': '8d330aabb2f7c7ca00d5ace55110f7d4f977f2bae53f5605f2bf4230b19eb494', 'md5_hash': 'b55407ad89cd891755e1c9d6d0fd7045', 'sha1_hash': '5f846f9c74e274074a28172c1c940c32cb80acdc', 'detections': ['win_xworm_a0', 'win_xworm_w0', 'XWorm', 'win_mal_XWorm', 'INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA', 'MALWARE_Win_AsyncRAT', 'MALWARE_Win_XWorm'], 'link': 'https://www.unpac.me/results/4a34d5ec-d0dd-4f81-94a4-751312781404/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;XWorm&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related AsyncRAT activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: AsyncRAT, exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: ByteCode_MSIL_Backdoor_AsyncRAT, Check_Dlls, Check_OutputDebugStringA_iat, Check_Qemu_Description, Check_Qemu_DeviceMap&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — AsyncRAT typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. AsyncRAT frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. AsyncRAT is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>asyncrat</category>
    </item>
    <item>
      <title>Smoke Loader Sample Detected: file</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 27 Apr 2026 19:15:51 +0000</pubDate>
      <link>https://forem.com/threatchain/smoke-loader-sample-detected-file-1hg9</link>
      <guid>https://forem.com/threatchain/smoke-loader-sample-detected-file-1hg9</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/smoke-loader-sample-detected-file-cbd623c8" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. Smoke Loader is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Smoke Loader sample was identified by threat intelligence feeds on 2026-04-27 16:35:18. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;cbd623c8155afafef79eb8939b94fccabe2dad5237813a10e05d64eca79405ed&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;file&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;3.29 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-27 16:35:18&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Smoke Loader&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;dropped-by-GCleaner, exe, Smoke Loader, U, UNIQ.file&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;11/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Smoke Loader Does
&lt;/h2&gt;

&lt;p&gt;Smoke Loader is a long-running loader/downloader that delivers second-stage payloads, typically stealers or ransomware. It is modular, heavily obfuscated, and known for adapting to new defensive measures.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Smoke Loader samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'No threats detected', 'file_name': 'exe', 'date': '2026-04-27 16:35:58', 'analysis_url': 'https://app.any.run/tasks/a724dd03-725c-4b29-8308-249431969cd7', 'tags': []}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;clean2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;unknown&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': 'cbd623c8155afafef79eb8939b94fccabe2dad5237813a10e05d64eca79405ed', 'md5_hash': '521c4f26dcd52f06c3c6520a289e1f08', 'sha1_hash': '1e38b55379df294c06e26b7229125f065797230e', 'detections': [], 'link': 'https://www.unpac.me/results/a9bfa073-eba2-4d0a-a340-98a95427f052/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;SUSPICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;NoThreats&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Smoke Loader activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;cbd623c8155afafef79eb8939b94fccabe2dad5237813a10e05d64eca79405ed&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;file&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: dropped-by-GCleaner, exe, Smoke Loader, U, UNIQ.file&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: pe_no_import_table&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;cbd623c8155afafef79eb8939b94fccabe2dad5237813a10e05d64eca79405ed&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;file&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Smoke Loader typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Smoke Loader frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Smoke Loader is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/cbd623c8155afafef79eb8939b94fccabe2dad5237813a10e05d64eca79405ed/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>smokeloader</category>
    </item>
    <item>
      <title>Vidar Sample Detected: file</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 27 Apr 2026 11:17:51 +0000</pubDate>
      <link>https://forem.com/threatchain/vidar-sample-detected-file-22ae</link>
      <guid>https://forem.com/threatchain/vidar-sample-detected-file-22ae</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/vidar-sample-detected-file-a3357377" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;That 'free software' download just exfiltrated every password, cookie, and autofill entry on your machine in under 5 seconds.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Vidar sample was identified by threat intelligence feeds on 2026-04-27 10:27:05. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;a3357377a15308ee54ea18d92d17e44abf6bfb6811248cd9f1e248b79bc29d62&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;file&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2.53 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-27 10:27:05&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Vidar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;C, dropped-by-GCleaner, exe, MIX1.file, Vidar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;16/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Vidar Does
&lt;/h2&gt;

&lt;p&gt;Vidar is an information stealer derived from the Arkei family. It targets crypto wallets, 2FA backups, browser passwords, and session cookies — and it's often dropped by malvertising campaigns targeting users searching for popular software downloads.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Vidar samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;unknown&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;vidar&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': 'a3357377a15308ee54ea18d92d17e44abf6bfb6811248cd9f1e248b79bc29d62', 'md5_hash': '588c1a0dab3e16a2b459e20609131459', 'sha1_hash': '805b1219984ef7497a4cc6ff738a344bbab9ff59', 'detections': [], 'link': 'https://www.unpac.me/results/fa1fa6f8-4002-454c-a0e0-9b5b42689776/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;NotCategorized&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Vidar activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;a3357377a15308ee54ea18d92d17e44abf6bfb6811248cd9f1e248b79bc29d62&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;file&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: C, dropped-by-GCleaner, exe, MIX1.file, Vidar&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: command_and_control, CP_Script_Inject_Detector, DebuggerCheck_&lt;em&gt;API, DebuggerCheck&lt;/em&gt;&lt;em&gt;API, DebuggerCheck&lt;/em&gt;_QueryInfo&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;a3357377a15308ee54ea18d92d17e44abf6bfb6811248cd9f1e248b79bc29d62&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;file&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Vidar typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Vidar frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Vidar is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/a3357377a15308ee54ea18d92d17e44abf6bfb6811248cd9f1e248b79bc29d62/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>vidar</category>
    </item>
    <item>
      <title>Amadey Sample Detected: file</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Sun, 26 Apr 2026 19:16:13 +0000</pubDate>
      <link>https://forem.com/threatchain/amadey-sample-detected-file-1ham</link>
      <guid>https://forem.com/threatchain/amadey-sample-detected-file-1ham</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/amadey-sample-detected-file-213b55b1" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;It doesn't steal your data — it opens the door for everything else. Ransomware, stealers, miners. This loader delivers them all.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Amadey sample was identified by threat intelligence feeds on 2026-04-26 17:16:40. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;213b55b1c7e1bf89dcad5f085f15b6cf1ac70ae8d3a914ea91dfc9ca92f83052&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;file&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2.09 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-26 17:16:40&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Amadey&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;1TEST.file, A, Amadey, dropped-by-GCleaner, exe, signed&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;23/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Amadey Does
&lt;/h2&gt;

&lt;p&gt;Amadey is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Amadey samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': 'amadey', 'verdict': 'Malicious activity', 'file_name': 'exe', 'date': '2026-04-26 17:18:25', 'analysis_url': 'https://app.any.run/tasks/c3a560ab-cbc6-4ec2-94aa-a31b0640b16e', 'tags': ['amadey', 'botnet', 'stealer', 'golang']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;malicious&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CAPE&lt;/strong&gt;: &lt;code&gt;Amadey&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '213b55b1c7e1bf89dcad5f085f15b6cf1ac70ae8d3a914ea91dfc9ca92f83052', 'md5_hash': '07068a5ebe66b24112d96a3effab9b8e', 'sha1_hash': '85c069cae53057e9e063697635a696ac97a17000', 'detections': [], 'link': 'https://www.unpac.me/results/dac19764-879d-4c52-b93b-93e470777724/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;RemusStealer,RemusLogger&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;NO_THREAT&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Amadey activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;213b55b1c7e1bf89dcad5f085f15b6cf1ac70ae8d3a914ea91dfc9ca92f83052&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;file&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: 1TEST.file, A, Amadey, dropped-by-GCleaner, exe, signed&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: Amadey, cobalt_strike_tmp01925d3f, command_and_control, CP_Script_Inject_Detector, DebuggerCheck__API&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;213b55b1c7e1bf89dcad5f085f15b6cf1ac70ae8d3a914ea91dfc9ca92f83052&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;file&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Amadey typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Amadey frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Amadey is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/213b55b1c7e1bf89dcad5f085f15b6cf1ac70ae8d3a914ea91dfc9ca92f83052/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>amadey</category>
    </item>
    <item>
      <title>WeedHack Sample Detected: krypton.1.21.11 (2).jar</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Sun, 26 Apr 2026 11:15:46 +0000</pubDate>
      <link>https://forem.com/threatchain/weedhack-sample-detected-krypton12111-2jar-38mj</link>
      <guid>https://forem.com/threatchain/weedhack-sample-detected-krypton12111-2jar-38mj</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/weedhack-sample-detected-krypton-1-21-11-2-jar-c5215f48" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. WeedHack is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new WeedHack sample was identified by threat intelligence feeds on 2026-04-26 11:02:28. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;c5215f48f6038ec5d14d29e380b9760135f328bcf49c6f78571e0cf2b23278d4&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;krypton.1.21.11 (2).jar&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;jar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;1.11 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;NL&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-26 11:02:28&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;WeedHack&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;jar, SilentNet, WeedHack&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;7/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What WeedHack Does
&lt;/h2&gt;

&lt;p&gt;WeedHack is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. WeedHack samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'Suspicious activity', 'file_name': 'jar', 'date': '2026-04-26 11:05:14', 'analysis_url': 'https://app.any.run/tasks/16f02e82-fa7c-4ff1-8091-60b83982a003', 'tags': ['python', 'antivm', 'openssl', 'tool']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;SUSPICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related WeedHack activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;c5215f48f6038ec5d14d29e380b9760135f328bcf49c6f78571e0cf2b23278d4&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;krypton.1.21.11 (2).jar&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: jar&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: jar, SilentNet, WeedHack&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: DetectEncryptedVariants, RANSOMWARE, telebot_framework, Weedhack_Family_Generic&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;c5215f48f6038ec5d14d29e380b9760135f328bcf49c6f78571e0cf2b23278d4&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;krypton.1.21.11 (2).jar&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — WeedHack typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. WeedHack frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. WeedHack is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/c5215f48f6038ec5d14d29e380b9760135f328bcf49c6f78571e0cf2b23278d4/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>weedhack</category>
    </item>
    <item>
      <title>Formbook Sample Detected: 06EWFQ0K.ps1</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Sat, 25 Apr 2026 19:15:50 +0000</pubDate>
      <link>https://forem.com/threatchain/formbook-sample-detected-06ewfq0kps1-160a</link>
      <guid>https://forem.com/threatchain/formbook-sample-detected-06ewfq0kps1-160a</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/formbook-sample-detected-06ewfq0k-ps1-db9f4288" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Someone on your team opened an Excel file 10 minutes ago. Their browser passwords, email credentials, and keystrokes are already being sent to a server in Eastern Europe.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new Formbook sample was identified by threat intelligence feeds on 2026-04-25 17:43:11. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;db9f42884c1a7e89475cf33e639f3e98d88300615309de64aa2a7232a9823a2f&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;06EWFQ0K.ps1&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;ps1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;1.46 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;CL&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-25 17:43:11&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Formbook&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Formbook, ps1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;22/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What Formbook Does
&lt;/h2&gt;

&lt;p&gt;Formbook is a credential-stealing trojan that hooks browser APIs to capture passwords, form submissions, and clipboard contents. It's been active since 2016 and continues to evolve, with recent campaigns using fake invoice and purchase order lures.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. Formbook samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;formbook&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;NoThreats&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related Formbook activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;db9f42884c1a7e89475cf33e639f3e98d88300615309de64aa2a7232a9823a2f&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;06EWFQ0K.ps1&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: ps1&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: Formbook, ps1&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: CP_Script_Inject_Detector, DebuggerCheck_&lt;em&gt;GlobalFlags, DebuggerCheck&lt;/em&gt;&lt;em&gt;GlobalFlags, DebuggerCheck&lt;/em&gt;&lt;em&gt;QueryInfo, DebuggerCheck&lt;/em&gt;_QueryInfo&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;db9f42884c1a7e89475cf33e639f3e98d88300615309de64aa2a7232a9823a2f&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;06EWFQ0K.ps1&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — Formbook typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. Formbook frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. Formbook is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/db9f42884c1a7e89475cf33e639f3e98d88300615309de64aa2a7232a9823a2f/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>formbook</category>
    </item>
    <item>
      <title>RustyStealer Sample Detected: Setup.exe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Sat, 25 Apr 2026 11:16:16 +0000</pubDate>
      <link>https://forem.com/threatchain/rustystealer-sample-detected-setupexe-37jo</link>
      <guid>https://forem.com/threatchain/rustystealer-sample-detected-setupexe-37jo</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/rustystealer-sample-detected-setup-exe-4c351350" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. RustyStealer is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new RustyStealer sample was identified by threat intelligence feeds on 2026-04-25 10:53:52. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;4c351350f946bd33db9e87df3ad0dfd9547bb88156318df5129a7438b79d4b00&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Setup.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;935.5 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;BY&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-25 10:53:52&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;RustyStealer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;exe, Infostealer, Kryptik, PSW, RustyStealer, StealC, Stealer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;44/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What RustyStealer Does
&lt;/h2&gt;

&lt;p&gt;RustyStealer is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. RustyStealer samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ANY.RUN&lt;/strong&gt;: &lt;code&gt;[{'malware_family': None, 'verdict': 'Malicious activity', 'file_name': 'exe', 'date': '2026-04-25 10:57:11', 'analysis_url': 'https://app.any.run/tasks/da35beea-4caa-4223-a6d6-b0476e162233', 'tags': ['stealc', 'stealer']}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;vxCube&lt;/strong&gt;: &lt;code&gt;malware2&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intezer&lt;/strong&gt;: &lt;code&gt;unknown&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;stealc&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;UnpacMe&lt;/strong&gt;: &lt;code&gt;[{'sha256_hash': '4c351350f946bd33db9e87df3ad0dfd9547bb88156318df5129a7438b79d4b00', 'md5_hash': '1cc7dfd1b1215fd971dfc16864d09b3d', 'sha1_hash': '5cf4a55d8a51ec7af02105a1f707b92d10252005', 'detections': [], 'link': 'https://www.unpac.me/results/b0cac878-62c7-47cd-9b95-2e72f32f02b5/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;LIKELY_MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related RustyStealer activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;4c351350f946bd33db9e87df3ad0dfd9547bb88156318df5129a7438b79d4b00&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;Setup.exe&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: exe&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: exe, Infostealer, Kryptik, PSW, RustyStealer, StealC, Stealer&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: golang_bin_JCorn_CSC846, pe_detect_tls_callbacks, ProgramLanguage_Rust, Rustyloader_mem_loose, SEH__vectored&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;4c351350f946bd33db9e87df3ad0dfd9547bb88156318df5129a7438b79d4b00&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;Setup.exe&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — RustyStealer typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. RustyStealer frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. RustyStealer is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/4c351350f946bd33db9e87df3ad0dfd9547bb88156318df5129a7438b79d4b00/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>rustystealer</category>
    </item>
    <item>
      <title>RemcosRAT Sample Detected: Purchase_Order_2455.JS</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Fri, 24 Apr 2026 19:17:07 +0000</pubDate>
      <link>https://forem.com/threatchain/remcosrat-sample-detected-purchaseorder2455js-4fhh</link>
      <guid>https://forem.com/threatchain/remcosrat-sample-detected-purchaseorder2455js-4fhh</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/remcosrat-sample-detected-purchase-order-2455-js-440836d9" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;For $58 on a hacking forum, anyone can buy full remote control of your computer. Camera, keyboard, files — everything.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new RemcosRAT sample was identified by threat intelligence feeds on 2026-04-24 17:40:38. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;440836d991a02bc8e8d2e40b2d6512a78a6898ba0d4ef8188339e36584666bc9&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Purchase_Order_2455.JS&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;js&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;6.09 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-24 17:40:38&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;RemcosRAT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;js, RemcosRAT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;12/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What RemcosRAT Does
&lt;/h2&gt;

&lt;p&gt;RemcosRAT is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. RemcosRAT samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;remcos&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FileScan-IO&lt;/strong&gt;: &lt;code&gt;MALICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related RemcosRAT activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;440836d991a02bc8e8d2e40b2d6512a78a6898ba0d4ef8188339e36584666bc9&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;Purchase_Order_2455.JS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: js&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: js, RemcosRAT&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: BLOWFISH_Constants, CP_Script_Inject_Detector, DebuggerCheck__API, DetectEncryptedVariants, Detect_all_IPv6_variants&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;440836d991a02bc8e8d2e40b2d6512a78a6898ba0d4ef8188339e36584666bc9&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;Purchase_Order_2455.JS&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — RemcosRAT typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. RemcosRAT frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. RemcosRAT is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/440836d991a02bc8e8d2e40b2d6512a78a6898ba0d4ef8188339e36584666bc9/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>remcosrat</category>
    </item>
    <item>
      <title>SnappyClient Sample Detected: YRJKHYWK.msi</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Fri, 24 Apr 2026 11:17:28 +0000</pubDate>
      <link>https://forem.com/threatchain/snappyclient-sample-detected-yrjkhywkmsi-164k</link>
      <guid>https://forem.com/threatchain/snappyclient-sample-detected-yrjkhywkmsi-164k</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/snappyclient-sample-detected-yrjkhywk-msi-562d8f83" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. SnappyClient is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A new SnappyClient sample was identified by threat intelligence feeds on 2026-04-24 10:04:49. This post breaks down what we know about the specific sample, how to recognize related activity on your network, and what to do if you or your organization might be affected.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Sample at a Glance
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Field&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;562d8f8381ad20a7140a5b7a060ff4ee60484eb815bf442f7071e293678ca95d&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;YRJKHYWK.msi&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;msi&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;6.61 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin (first observed)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;HU&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;2026-04-24 10:04:49&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;SnappyClient&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tags&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;msi, SnappyClient&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;VirusTotal detection&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;17/75 engines flagged malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What SnappyClient Does
&lt;/h2&gt;

&lt;p&gt;SnappyClient is a malware family observed delivering malicious payloads to Windows systems. Samples in this family typically steal credentials, establish persistence, or enable remote access for attackers.&lt;/p&gt;

&lt;p&gt;Seeing this family on your network — or finding a file matching this hash — is a red flag. SnappyClient samples are typically distributed through phishing emails, malvertising, fake software downloads, or cracked installers. Once executed, the malware usually establishes persistence on the host, harvests credentials and sensitive data, and establishes an outbound channel to command-and-control infrastructure operated by the attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  Detection Landscape
&lt;/h2&gt;

&lt;p&gt;Multiple security vendors have weighed in on this specific sample:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;YOROI_YOMI&lt;/strong&gt;: &lt;code&gt;Malicious File&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;InQuest&lt;/strong&gt;: &lt;code&gt;SUSPICIOUS&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CAPE&lt;/strong&gt;: &lt;code&gt;HijackLoader&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Triage&lt;/strong&gt;: &lt;code&gt;hijackloader&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spamhaus_HBL&lt;/strong&gt;: &lt;code&gt;[{'detection': 'suspicious', 'link': 'https://www.spamhaus.org/hbl/'}]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;VMRay&lt;/strong&gt;: &lt;code&gt;IDATLoader,SHADOWLADDER,HijackLoader,GHOSTPULSE&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kaspersky&lt;/strong&gt;: &lt;code&gt;Malware&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Indicators of Compromise
&lt;/h2&gt;

&lt;p&gt;If you're hunting for this sample or related SnappyClient activity, here are the concrete indicators to feed into your SIEM, EDR, or host-based searches:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SHA-256 hash&lt;/strong&gt;: &lt;code&gt;562d8f8381ad20a7140a5b7a060ff4ee60484eb815bf442f7071e293678ca95d&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Filename pattern&lt;/strong&gt;: &lt;code&gt;YRJKHYWK.msi&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;File type&lt;/strong&gt;: msi&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Behavioral tags&lt;/strong&gt;: msi, SnappyClient&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;YARA rules matched&lt;/strong&gt;: FreddyBearDropper&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Check If You're Affected
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your endpoint logs&lt;/strong&gt; for the SHA-256 &lt;code&gt;562d8f8381ad20a7140a5b7a060ff4ee60484eb815bf442f7071e293678ca95d&lt;/code&gt;. Most EDR platforms support historical hash searches across all monitored hosts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for the filename&lt;/strong&gt; &lt;code&gt;YRJKHYWK.msi&lt;/code&gt; in recently downloaded files, email attachments, and installer bundles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look for outbound connections&lt;/strong&gt; to uncommon TLDs or newly registered domains — SnappyClient typically beacons to command-and-control infrastructure shortly after execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review scheduled tasks and registry run keys&lt;/strong&gt; — this family commonly establishes persistence through standard Windows autorun locations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run an updated AV or EDR scan&lt;/strong&gt; across potentially affected hosts. Because this sample is already in public threat intel feeds, current signatures should flag it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What to Do If You Find It
&lt;/h2&gt;

&lt;p&gt;If you find evidence of this sample or related activity on your systems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Isolate the affected host&lt;/strong&gt; from the network immediately to prevent lateral movement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capture memory and disk images&lt;/strong&gt; before rebooting. Reboots destroy critical forensic evidence, especially in RAM.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rotate credentials&lt;/strong&gt; that may have been exposed — browser-saved passwords, VPN credentials, SSH keys, and any service accounts used on the affected host. SnappyClient frequently targets these.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check for secondary payloads&lt;/strong&gt;. SnappyClient is often a stepping stone for additional malware including ransomware or banking trojans.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Report the incident&lt;/strong&gt; to your security team. For larger organizations, consider notifying your regional CERT.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Free Threat Lookups
&lt;/h2&gt;

&lt;p&gt;You can verify any suspicious hash against the ThreatChain database for free — no signup, no API key required. Paste any MD5, SHA-1, or SHA-256 at &lt;a href="https://threatchain.io/lookup" rel="noopener noreferrer"&gt;threatchain.io/lookup&lt;/a&gt; and get results across multiple intel sources in seconds.&lt;/p&gt;

&lt;p&gt;For cross-referencing this specific sample, you can also look it up directly on &lt;a href="https://bazaar.abuse.ch/sample/562d8f8381ad20a7140a5b7a060ff4ee60484eb815bf442f7071e293678ca95d/" rel="noopener noreferrer"&gt;MalwareBazaar&lt;/a&gt; where the original submission and vendor analysis is recorded.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>snappyclient</category>
    </item>
  </channel>
</rss>
