URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as RapidStealer.

Database Entry


Signature:RapidStealer
Firstseen:2025-07-01 06:58:28 UTC
Lastseen:2026-04-19 17:23:39 UTC
Unique Payloads:5
URLs:4

Payload


The table below shows all payloads that have been identified as RapidStealer.

Firstseen (UTC)SHA256File TypeFile sizeVT
2026-04-19 17:23:39671b028033d4123f85d64c3c60ccf1f3057bf1e80b3189a355950ba6144ad256Executable exe70'148'190n/a
2026-04-16 11:45:43aa589ef7e0ea27bed4ee87929117cfc5b28b68c343b3991209514db311c1a3ecExecutable exe70'119'027n/a
2025-08-15 19:08:1867e894471bd87e48e8a3d5b272134b21975bbf47448b8fa0d4d26ab7944c1f8bMicrosoft Software Installer (MSI) msi42'696'704n/a
2025-08-15 19:08:1467e894471bd87e48e8a3d5b272134b21975bbf47448b8fa0d4d26ab7944c1f8bMicrosoft Software Installer (MSI) msi42'696'704n/a
2025-07-01 06:58:2880cb42a7a6cea0a74824b0d6917ff49ed80eeeea5cc363cdde025ad3013d9e3fMicrosoft Software Installer (MSI) msi44'249'088Virustotal results 0 / 63 (0.00)

Number of entries displayed: 5 (max: 1'000)