URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as XillenStealer.

Database Entry


Signature:XillenStealer
Firstseen:2026-01-19 02:35:08 UTC
Lastseen:2026-01-29 09:27:33 UTC
Unique Payloads:6
URLs:5

Payload


The table below shows all payloads that have been identified as XillenStealer.

Firstseen (UTC)SHA256File TypeFile sizeVT
2026-01-29 09:27:336946edc98e330e7ab257a2a17288297ef8dc1d9de7cd0415640aa1bcb5ee6308Executable exe207'872n/a
2026-01-28 20:16:0876c055078a4ce834bb4f39c1a371363fe496045247e70edcdcf70ed423a5ff30Executable exe2'607'104n/a
2026-01-20 09:21:083265bf6454d7938ad52e73ebce2d6be97a131dcd2f58a87a3d5a5c7aa233b89cExecutable exe188'928n/a
2026-01-19 16:34:06991a9af284a91b109aefe0d29f9feb521ec108d1664ae22d2a4d47b3949208cdExecutable exe197'120n/a
2026-01-19 02:46:058da1cfcb453aeca76801963c3e50990929e4c0a40847222b93bead34413b342dExecutable exe199'168n/a
2026-01-19 02:35:088da1cfcb453aeca76801963c3e50990929e4c0a40847222b93bead34413b342dExecutable exe199'168n/a

Number of entries displayed: 6 (max: 1'000)