🦀💮 Rust Malware Sample Gallery

Hokusai - Crab and Flowers
About
The intention of this page is to collect and highlight malware written in the Rust programming language, so that malware reverse engineers have a collection of Rust samples to practice reversing on. Malware written in Rust is rapidly becoming a significant problem, especially with the advent of high-impact ransomware families such as BlackCat. However, the knowledge in the malware reverse engineering community on how to reverse Rust binaries is still very poor.
I have collected at least one publicly available sample for each family. Definitive identification of malware families is hard, and I am not personally familiar with every malware family here, so I have tried to stick to sample hashes that are directly mentioned in the linked writeups. For each sample mentioned, a download link for that sample on either Malware Bazaar or MalShare is provided - neither of these sites require an account to download samples.
This is not meant to be a comprehensive effort to track the evolution of these malware families, or to collect every writeup about a malware family. I have tried to collect writeups that are technical, or that highlight something new or interesting about the family. The focus is also on malware that has been observed in the wild, so red teaming tools written in Rust won't be listed here, unless they have been seen in the wild by an independent party.
If you would like to contribute or see something that should be changed, please submit a Pull Request on this GitHub repository. Alternatively, you can Contact me directly.
Agenda Ransomware
Aliases
Qilin, AgendaCrypt
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
e90bdaaf5f9ca900133b699f18e4062562148169b29cb4eb37a0577388c22527 |
MalwareBazaar |
BlackCat Ransomware
Aliases
ALPHV, Noberus
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
3d7cf20ca6476e14e0a026f9bdd8ff1f26995cdc5854c3adb41a6135ef11ba83 |
MalwareBazaar |
BlackCat Ransomware (Sphynx)
Aliases
ALPHV Sphynx
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
c0e70e69d8f7432383fa37528cd42db764b73dd08eb75d72229c2a0d02e538cc |
MalwareBazaar |
CargoBay
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
a963a8a8e1583081daa43638744eef6c410d1a410c11eb9413da15a26e802de5 |
MalwareBazaar |
Notes
It's difficult to definitively identify CargoBay samples, as public information about it is limited. According to the publicly available contents of the 2022-11-29 IBM X-Force report, the source code of CargoBay is based on the source code from the book Black Hat Rust: https://github.com/skerkour/black-hat-rust
Convuster
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
947ae8f075fd0d1e5be0341b922c0173f0c5cfd771314ebe220207f3ed53466a |
MalShare |
Notes
This is technically not malware - it is adware.
CosmicRust
Writeups
Samples
| SHA-256 Hash |
Download Link |
3315e5a4590e430550a4d85d0caf5f521d421a2966b23416fcfc275a5fd2629a |
MalShare |
DeltaStealer
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
c92a7425959121ff49970c53b78e714b9e450e4b214ac85deb878d0bedf82a70 |
MalwareBazaar |
ExeWho2
Writeups
Samples
| SHA-256 Hash |
Download Link |
a36967a40dcff74c04b5dd80f1aa685925912df8ff6cb63c14059439e08d5f8d |
MalwareBazaar |
Notes
Source code was found with the ExeWho2 binary; it is available at https://github.com/cyb3rkitties/exewho2
FickerStealer
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
dc021a0ca0bb3f66d54d15d2b236422c0b90399ea762c7d7aa6d727b9bd5b46c |
MalwareBazaar |
See also all samples tagged with the FickerStealer signature on Malware Bazaar.
Freeze.rs
Writeups
Samples
| SHA-256 Hash |
Download Link |
afd38445e5249ac5ac66addd18c20d271f41c3ffb056ca49c8c02f9fecb4afcb |
MalShare |
Notes
Source code (for the tool that generates the actual payloads) available at https://github.com/optiv/Freeze.rs
Hive Ransomware (Rust variant)
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
f4a39820dbff47fa1b68f83f575bc98ed33858b02341c5c0464a49be4e6c76d3 |
MalwareBazaar |
Hunters International Ransomware
Writeups
Samples
| SHA-256 Hash |
Download Link |
c4d39db132b92514085fe269db90511484b7abe4620286f6b0a30aa475f64c3e |
MalwareBazaar |
JLORAT
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
69bb729ff354cd9651f99a05f74f3ea20d483dc8e6e5838e4dd48858fd500d29 |
MalwareBazaar |
Luca Stealer
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
99331a27afa84009e140880a8739d96f97baa1676d67ba7a3278fe61bfb79022 |
MalShare |
Notes
Source code available at https://web.archive.org/web/20220725203750/https://github.com/luca364/rust-stealer/archive/refs/heads/master.zip
Luna Ransomware
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
1cbbf108f44c8f4babde546d26425ca5340dccf878d306b90eb0fbec2f83ab51 |
MalShare |
Nokoyawa Ransomware (Rust variant)
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
7095beafff5837070a89407c1bf3c6acf8221ed786e0697f6c578d4c3de0efd6 |
MalwareBazaar |
P2PInfect
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
3a43116d507d58f3c9717f2cb0a3d06d0c5a7dc29f601e9c2b976ee6d9c8713f |
MalwareBazaar |
Notes
This sample (3a43116d507d58f3c9717f2cb0a3d06d0c5a7dc29f601e9c2b976ee6d9c8713f) isn't one of the hashes mentioned in the linked reports; however, due to the nature of this malware, there are a lot of unique samples out there, and I was able to find this one after some hunting.
RansomExx2
Aliases
Defray, Defray777
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
a7ea1e33c548182b8e56e32b547afb4b384ebe257ca0672dbf72569a54408c5c |
MalShare |
Realst Stealer
Writeups
Samples
| SHA-256 Hash |
Download Link |
2af0e212ad70eaf8b96a645045ef2764700b5adf7b1187ae3d82240f96f613e2 |
MalwareBazaar |
See also all samples tagged with the RealstStealer tag on Malware Bazaar.
Rust-based loader for Rilide
Aliases
BRAINSTORM
Writeups
Samples
| SHA-256 Hash |
Download Link |
0f11aeecbde1f355d26c9d406dad80cb0ae8536aea31fdddaf915d4afd434f3f |
MalwareBazaar |
Rust-based stealer used in RusticWeb campaign
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
db91e23d9715464511057f2e15c9adc97d3f27fcfa308f05ac7e2de7275fdd32 |
MalShare |
RustBucket
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
9ca914b1cfa8c0ba021b9e00bda71f36cad132f27cf16bda6d937badee66c747 |
MalShare |
de81e5246978775a45f3dbda43e2716aaa1b1c4399fe7d44f918fccecc4dd500 |
MalwareBazaar |
Rustic Crypter
Writeups
Samples
| SHA-256 Hash |
Download Link |
45aa8efb6b1a9a0e0091040bb99a7c37d346aaf306fa4e31e9d5d9f0fef56676 |
MalwareBazaar |
RustyBuer
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
3abed86f46c8be754239f8c878f035efaae91c33b8eb8818c5bbed98c4d9a3ac |
MalwareBazaar |
RustyFlag
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
5327308fee51fc6bb95996c4185c4cfcbac580b747d79363c7cf66505f3ff6db |
MalwareBazaar |
SPICA
Writeups
Samples
| SHA-256 Hash |
Download Link |
37c52481711631a5c73a6341bd8bea302ad57f02199db7624b580058547fb5a9 |
MalwareBazaar |
SysJoker (Rust variant)
Aliases
RustDown
Writeups
Malpedia
Samples
| SHA-256 Hash |
Download Link |
d4095f8b2fd0e6deb605baa1530c32336298afd026afc0f41030fa43371e3e72 |
MalShare |
Zeon Ransomware (Rust variant)
Writeups
Samples
| SHA-256 Hash |
Download Link |
fb57abf08a85f1d7ca0a6fdcd76b04ccf964a5b05f2f784492083994773e4590 |
MalShare |
Notes
There is a lack of good open reporting on Zeon Ransomware, so I will clarify a few potential points of confusion in the notes here.
There are samples which have been identified as Zeon Ransomware, but which are written with Python rather than Rust. These samples are packaged via PyInstaller, and obfuscated with PyArmor. For example, c860bf644bd5e3d6f4cae67848c4fc769184ae652fcb41cac670042b185d217a (MalShare) is a PyInstaller file which drops a nearly identical ransom note as the highlighted Rust sample above, fb57abf08a85f1d7ca0a6fdcd76b04ccf964a5b05f2f784492083994773e4590 The ransom note of both samples say "All of your files are currently encrypted by ZEON strain", and link to the same Tor site (http[:]//zeonrefpbompx6rwdqa5hxgtp2cxgfmoymlli3azoanisze33pp3x3yd[.]onion), for victims to begin the payment process.
There is reporting which states that Zeon Ransomware is connected to Royal Ransomware, such as CISA's advisory on Royal Ransomware. However, I have not been able to find any reporting that states Royal Ransomware is written in Rust, nor any Rust samples of Royal Ransomware.