URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as IrisStealer.

Database Entry


Signature:IrisStealer
Firstseen:2024-12-24 11:58:46 UTC
Lastseen:2025-04-16 11:42:18 UTC
Unique Payloads:3
URLs:2

Payload


The table below shows all payloads that have been identified as IrisStealer.

Firstseen (UTC)SHA256File TypeFile sizeVT
2025-04-16 11:42:18208fc7562640165f2d750ebe56b264357e18447b15e4dd37c96f3c3df3ff4745Executable exe18'823'585n/a
2025-03-23 16:21:1823ef840aa08355dcb42cb532bb847002ee62de008433c647a738525d8f187310Executable exe16'610'689n/a
2024-12-24 11:58:46b0ccad563c89aeb1319e33e712f447750767e7ededec5c403df7215fdac60b3cExecutable exe16'709'537n/a

Number of entries displayed: 3 (max: 1'000)