Threat Database Stealers Trojan.Stealer.UB

Trojan.Stealer.UB

By CagedTech in Stealers, Trojans

Threat Scorecard

Popularity Rank: 10,556
Threat Level: 80 % (High)
Infected Computers: 1,565
First Seen: September 2, 2021
Last Seen: March 7, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Stealer.UB
Signature status: Self Signed

Known Samples

MD5: a75278f4a91997a827a34a52a3bd8f46
SHA1: 74625faf4d8e67f8d09c79bafe10cd5e6a6c7689
SHA256: 3BBDC8F264E816B66C3DC55771BA02FEC24E504C07FE23539242B37AD5C14FFD
File Size: 5.70 MB, 5702640 bytes
MD5: 766421818a7e8a3657ae088698ad0e44
SHA1: 4eceeaa98fdf2fac5070695bb7dbda2f8ee62f14
SHA256: 800962E0F13611C1197C54A2FCFA5DC24F42ECA4A6E8081A73638AE6E6380CD0
File Size: 5.70 MB, 5702640 bytes
MD5: 22907101c5987476015955e879ec816d
SHA1: d4708d80658c1a118652f05a153cdd5f68f20173
SHA256: A68444F673255A2E11581166E2A2251AEA98BEFB37ECB13A3432180A06816DAD
File Size: 4.90 MB, 4895744 bytes
MD5: 62defe5a99b589fea24f8fd8e6be5074
SHA1: f56ae64afc4a939f384052fb9f5ae32892870415
SHA256: AFED751CE662A42ACB0D42957CEEE56688774F56EE1BA2DA2B1C21C5878A5874
File Size: 6.12 MB, 6115328 bytes
MD5: 27662ef27c6727721570f9c318f5e6c9
SHA1: 6aef417f2ec14f43ea15f1858782d01e344d1520
SHA256: C3B2D2F7BB46F6C68BD4E61973AE8D0C924A421C304AD1011DDD11234F780031
File Size: 4.04 MB, 4038817 bytes
Show More
MD5: 94c4ec8e965ca2a723dc628cd7e34315
SHA1: 9e998234041cae4e69054963c64c4f5c936ee654
SHA256: 9504A2F6BC8C5FC0B16ED0C85D61A1D54EDC15379ADF18FB1B58F11F84BC45BD
File Size: 6.57 MB, 6573056 bytes
MD5: d2137fdc01a3322547c8a289de956cf0
SHA1: ea5049d13f7edfc5ea95cd5bb51d84c7b7261794
SHA256: FD10A4711483C47749F9F1B763B9EFAA237F2E5AF1B2250A5B9B959AAF59361F
File Size: 6.23 MB, 6230696 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version
  • 25.0.9467.22040
  • 3.4.142.1813
  • 1.0.0.1
  • 1.0.0.0
Comments Taxware Software Auto Patcher
Company Name Taxware Systems, Inc
File Description
  • Bet
  • MEIDevice
  • NemesisTool
  • PERS
  • TaxwareAutoPatcher
File Version
  • 25.0.9467.22040
  • 24.11.05.1
  • 3.4.142.1813
  • 1.0.0.0
Internal Name
  • Bet.exe
  • EX3cutioN3Rv1.0.exe
  • NemesisTool.exe
  • PERS.exe
  • Pontus.exe
  • TWUpdate.exe
Legal Copyright
  • Copyright © 2016
  • Copyright © 2021
  • Copyright © 2024
  • Copyright © 2025
  • Copyright © Taxware Systems 2022
  • Pearlabyss Corp
Original Filename
  • Bet.exe
  • EX3cutioN3Rv1.0.exe
  • NemesisTool.exe
  • PERS.exe
  • Pontus.exe
  • TWUpdate.exe
Product Name
  • Bet
  • MEIDevice
  • NemesisTool
  • PERS pss version
  • TaxwareAutoPatcher
Product Version
  • 25.0.9467.22040
  • 24.11.05.1
  • 3.3.650
  • 1.0.0.0

Digital Signatures

Signer Root Status
Pearl abyss Corp DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Self Signed
TAXWARE SYSTEMS, INC. DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Self Signed
Pearl abyss Corp DigiCert Trusted Root G4 Root Not Trusted

File Traits

  • 2+ executable sections
  • HighEntropy
  • themida
  • themida section variant
  • x86

Block Information

Total Blocks: 6
Potentially Malicious Blocks: 0
Whitelisted Blocks: 2
Unknown Blocks: 4

Visual Map

? ? ? 0 ? 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Stealer.UB

Files Modified

File Attributes
\device\harddisk0\dr0 Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\programdata\mntemp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\taxwareautopatcherv2.err.log Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation

Trending

Most Viewed

Loading...