DATE: February 14, 2026
CATEGORY: MALWARE Intelligence

Investigation of suspicious samples on VirusTotal revealed multiple malicious files communicating with infrastructure linked to SigmaWare Stealer, a commercial information stealer distributed within underground communities.

Static and behavioral analysis confirms credential theft, screen capture, and surveillance capabilities matching SigmaWare’s advertised features.

VirusTotal Sample Evidence

Basic sample information observed in VirusTotal:

Behavioral execution showing stealer activities:

Advertised Capabilities

The malware dashboard advertises capabilities including:

  • Live screen capture
  • Remote screenshots
  • File theft
  • Network credential stealing
  • Anti-VM and sandbox bypass

Operator Attribution

The operation appears linked to underground actor hasar0001, active on cybercrime forums and marketplaces.

Telegram infrastructure used for communication:

https://t.me/hasar0001
https://t.me/sigmawarecc

Panel Country Lock Feature

User of Sigmaware can restrict panel login to selected countries.

Indicators of Compromise

01a49dff1a0b7a80662bab088204cc19ef728926c677bd147d93959bddfd881f
3d81d7c34040cf7eef01263d38d819331dc717b377c2b590b1538cdb25c7404e
e978a9f59e82c82775c0dd4da03971396d782c5cd9047b15228a458cc42b70b2
a8ae3c5ecaf6e261d4a46ec30ea88ee72b8a81f83440f73cd88a3a5fbf6c102f
sigmaware[.]store

Conclusion

SigmaWare operates as a commercial stealer platform providing credential theft and surveillance functionality. Observed telemetry and OSINT correlations indicate active underground distribution.

← BACK TO BLOG