URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as CinoshiStealer.

Database Entry


Signature:CinoshiStealer
Firstseen:2023-03-10 09:20:12 UTC
Lastseen:2023-05-15 05:37:18 UTC
Unique Payloads:4
URLs:4

Payload


The table below shows all payloads that have been identified as CinoshiStealer.

Firstseen (UTC)SHA256File TypeFile sizeVT
2023-05-15 05:37:185618be4b10205d3fb67baf5dfdfd2d8089b0858578b59e06bdc9e98dfc164220Executable exe419'840Virustotal results 38 / 70 (54.29)
2023-04-15 06:46:144d35f6ecb36219505e4635b8265e5a3586e32b5915f32f96e2bf98eab20d7e04Executable exe615'424n/a
2023-04-15 06:46:124d35f6ecb36219505e4635b8265e5a3586e32b5915f32f96e2bf98eab20d7e04Executable exe615'424n/a
2023-03-10 09:20:12a050521e44bf504fe73e220798b66ce91259238fbcb1b04e206f5a78959e5aebExecutable exe614'912Virustotal results 30 / 67 (44.78)

Number of entries displayed: 4 (max: 1'000)