URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as XoriumStealer.

Database Entry


Signature:XoriumStealer
Firstseen:2025-12-20 20:41:12 UTC
Lastseen:2025-12-29 21:47:07 UTC
Unique Payloads:2
URLs:2

Payload


The table below shows all payloads that have been identified as XoriumStealer.

Firstseen (UTC)SHA256File TypeFile sizeVT
2025-12-29 21:47:07cc602ccf1bccf62233fc5f6450ea3e3dedfa9d8113cc02488f089df7db92f4d8Executable exe471'040n/a
2025-12-20 20:41:12331037f720f42e36e2e5c45782fda505c5e736976f006ceca3508e7b1a7ba30eExecutable exe468'480n/a

Number of entries displayed: 2 (max: 1'000)