MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 04c7a8fc8e75fa2a6f788b3c92cd46d6d99a517add2f875d9fdf8b4377d54acf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 04c7a8fc8e75fa2a6f788b3c92cd46d6d99a517add2f875d9fdf8b4377d54acf
SHA3-384 hash: 87c53c83078fa155bd5220c2d85fa624d02afeadb444ed716f9c7347eff62a2ce937b2cacf192440334d79252bc8b345
SHA1 hash: 66621986e07fa188ca06665b6a06587ef721cd8c
MD5 hash: 88e0aec3a6fafc199feb2171cb04a634
humanhash: romeo-kansas-equal-pip
File name:88e0aec3a6fafc199feb2171cb04a634.exe
Download: download sample
Signature CryptBot
File size:1'816'845 bytes
First seen:2021-05-31 16:00:43 UTC
Last seen:2021-05-31 16:39:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 97ae071900480747f111dc72f77ef2b1 (3 x CryptBot)
ssdeep 49152:3nHmqMI1LsPuQU8U4GvAgwNF7H9jMoWaLmuKY0WQ/mApf:3nkdrh797W4mFYtfApf
Threatray 172 similar samples on MalwareBazaar
TLSH D5852316B7E1C8B5D0A317712F48B7BE0DB47AB0131582DB57A42C0B6966BC1AF3E247
Reporter abuse_ch
Tags:CryptBot exe


Avatar
abuse_ch
CryptBot C2:
http://moryce07.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://moryce07.top/index.php https://threatfox.abuse.ch/ioc/67614/

Intelligence


File Origin
# of uploads :
2
# of downloads :
229
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
MainSetupFile.exe
Verdict:
Malicious activity
Analysis date:
2021-05-30 18:35:01 UTC
Tags:
stealer trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Deleting a recently created file
DNS request
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Cryptbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 427213 Sample: 7dguPnfyzM.exe Startdate: 31/05/2021 Architecture: WINDOWS Score: 100 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus detection for URL or domain 2->38 40 4 other signatures 2->40 9 7dguPnfyzM.exe 7 2->9         started        process3 signatures4 42 Contains functionality to register a low level keyboard hook 9->42 12 cmd.exe 1 9->12         started        process5 signatures6 44 Submitted sample is a known malware sample 12->44 46 Obfuscated command line found 12->46 48 Uses ping.exe to sleep 12->48 50 Uses ping.exe to check the status of other devices and networks 12->50 15 cmd.exe 3 12->15         started        18 conhost.exe 12->18         started        process7 signatures8 52 Obfuscated command line found 15->52 54 Uses ping.exe to sleep 15->54 20 PING.EXE 1 15->20         started        23 Parlato.exe.com 15->23         started        25 findstr.exe 1 15->25         started        process9 dnsIp10 30 127.0.0.1 unknown unknown 20->30 27 Parlato.exe.com 1 23->27         started        process11 dnsIp12 32 SpWtAXNWYfIBsFAiwMEbCu.SpWtAXNWYfIBsFAiwMEbCu 27->32
Threat name:
Win32.PUA.7zip
Status:
Malicious
First seen:
2021-05-30 18:53:00 UTC
AV detection:
18 of 28 (64.29%)
Threat level:
  1/5
Result
Malware family:
cryptbot
Score:
  10/10
Tags:
family:cryptbot discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Modifies registry class
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
CryptBot
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments