MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 00dfe1c0275613464fac102cd1d1bf35983038db80455b92be2630fbe9cf040b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 7
| SHA256 hash: | 00dfe1c0275613464fac102cd1d1bf35983038db80455b92be2630fbe9cf040b |
|---|---|
| SHA3-384 hash: | 2b159e93988906b3ff7f6537ce7f7d1f2c91e36993795a863d4e55cbf5524648a015da1c1f360b73346dcfd0923cff71 |
| SHA1 hash: | 6f8a9477cad6a0f66b5e0670d5c9d59529a663ba |
| MD5 hash: | c8fe3c063172abfbdc0f5cab7c9855f1 |
| humanhash: | ten-golf-five-lion |
| File name: | c8fe3c063172abfbdc0f5cab7c9855f1.exe |
| Download: | download sample |
| File size: | 1'168'488 bytes |
| First seen: | 2021-03-09 15:21:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a1a66d588dcf1394354ebf6ec400c223 (49 x RedLineStealer, 7 x CryptBot, 4 x AZORult) |
| ssdeep | 24576:N53uhFG/lHNYyAxGGcafSVtOkR4BKQX69P67Nfrbvdv+2vH:N5+hFG9tU91SVtQX69irbvdZv |
| Threatray | 46 similar samples on MalwareBazaar |
| TLSH | DA4523A12AD000B6C89315737E65A3E959F9DE284B5848D37F3C020EFFE25C5AE3D169 |
| Reporter | |
| Tags: | exe |
Intelligence
File Origin
# of uploads :
1
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://crackknow.com/adobe-photoshop-cc-crack-keygen/
Verdict:
Malicious activity
Analysis date:
2021-03-09 13:41:42 UTC
Tags:
opendir autoit stealer trojan evasion loader danabot
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Deleting a recently created file
DNS request
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
72 / 100
Signature
Contains functionality to register a low level keyboard hook
Multi AV Scanner detection for submitted file
Obfuscated command line found
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Cryptbot
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.PUA.7zip
Status:
Malicious
First seen:
2021-03-09 11:40:35 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
1/5
Verdict:
suspicious
Similar samples:
+ 36 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
spyware
Behaviour
Delays execution with timeout.exe
Runs ping.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
dd375c3ce17e078f86a8cc30a2db413bdaa55688cd1e207cf23407c1d784ea3f
MD5 hash:
1337b794c4b1dc4791aad3518f75f2af
SHA1 hash:
624e13b4132a44081f6ecd4e036c6863b1c7f73a
SH256 hash:
00dfe1c0275613464fac102cd1d1bf35983038db80455b92be2630fbe9cf040b
MD5 hash:
c8fe3c063172abfbdc0f5cab7c9855f1
SHA1 hash:
6f8a9477cad6a0f66b5e0670d5c9d59529a663ba
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Tnega
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
exe 00dfe1c0275613464fac102cd1d1bf35983038db80455b92be2630fbe9cf040b
(this sample)
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.