MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 08e74804dbce755393239ab96ac551ef5ebd854f1061fea263ad3282c860b0fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 9


Intelligence 9 IOCs 3 YARA 17 File information Comments

SHA256 hash: 08e74804dbce755393239ab96ac551ef5ebd854f1061fea263ad3282c860b0fa
SHA3-384 hash: 98d60ddaaf59035c1a1c57c4173108baaef41b30c5e59ec74d76ac191530120f6f1c2f2097435e90ecea192e96c1c088
SHA1 hash: f6112f624fd737ee5d432056458b8e297850909b
MD5 hash: 06bacc55546ac250e33ff2d803c7e477
humanhash: mockingbird-mango-alpha-nineteen
File name:06bacc55546ac250e33ff2d803c7e477.exe
Download: download sample
Signature CryptBot
File size:3'606'598 bytes
First seen:2021-06-08 21:58:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e7f9a29f2c85394521a08b9f31f6275 (278 x GuLoader, 44 x RemcosRAT, 40 x VIPKeylogger)
ssdeep 98304:JcUi396Hjeej+afxt+V02jF5unxNvZ1TcidS9:Jcx9GqeigxsV0O6xJZ1DI9
Threatray 43 similar samples on MalwareBazaar
TLSH 06F53346B1040BB5DDC20D34AC45B33728F986983632D8DABB955E8A6F7B4309D0EF97
Reporter abuse_ch
Tags:CryptBot exe


Avatar
abuse_ch
CryptBot C2:
194.169.160.180:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://mortyl02.top/index.php https://threatfox.abuse.ch/ioc/73759/
http://olmjby22.top/index.php https://threatfox.abuse.ch/ioc/73760/
194.169.160.180:80 https://threatfox.abuse.ch/ioc/78935/

Intelligence


File Origin
# of uploads :
1
# of downloads :
242
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a UDP request
Creating a file
Searching for the window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Running batch commands
Deleting a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba Raccoon RedLine SmokeLoader Vid
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May modify the system service descriptor table (often done to hook functions)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Double Extension
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected Glupteba
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 431589 Sample: QPRfh1rEwy.exe Startdate: 08/06/2021 Architecture: WINDOWS Score: 100 207 Multi AV Scanner detection for domain / URL 2->207 209 Found malware configuration 2->209 211 Antivirus detection for URL or domain 2->211 213 18 other signatures 2->213 13 QPRfh1rEwy.exe 9 2->13         started        process3 file4 161 C:\Users\user\AppData\...\setup_installer.exe, PE32 13->161 dropped 16 setup_installer.exe 16 13->16         started        process5 file6 105 C:\Users\user\AppData\...\setup_install.exe, PE32 16->105 dropped 107 C:\Users\user\AppData\Local\...\metina_8.exe, PE32 16->107 dropped 109 C:\Users\user\AppData\Local\...\metina_4.exe, PE32 16->109 dropped 111 11 other files (2 malicious) 16->111 dropped 19 setup_install.exe 1 16->19         started        process7 dnsIp8 167 8.8.8.8 GOOGLEUS United States 19->167 169 104.21.92.229 CLOUDFLARENETUS United States 19->169 171 127.0.0.1 unknown unknown 19->171 215 Detected unpacking (changes PE section rights) 19->215 23 cmd.exe 1 19->23         started        25 cmd.exe 1 19->25         started        27 cmd.exe 1 19->27         started        29 8 other processes 19->29 signatures9 process10 process11 31 metina_7.exe 23->31         started        35 metina_3.exe 6 25->35         started        37 metina_4.exe 27->37         started        39 metina_8.exe 29->39         started        42 metina_2.exe 1 29->42         started        44 metina_1.exe 12 29->44         started        46 2 other processes 29->46 dnsIp12 193 212.192.241.136 RAPMSB-ASRU Russian Federation 31->193 195 162.255.119.200 NAMECHEAP-NETUS United States 31->195 203 2 other IPs or domains 31->203 113 C:\Users\...\TCHVW8XHMTZ45XRVOJLS3Q7V.exe, PE32 31->113 dropped 115 C:\Users\...\FP6RL983LC0XWAZNWT8L10GP.exe, PE32 31->115 dropped 48 cmd.exe 31->48         started        50 cmd.exe 31->50         started        52 cmd.exe 31->52         started        117 C:\Users\user\AppData\Local\...\install.dll, PE32 35->117 dropped 119 C:\Users\user\AppData\...119ewtonsoft.Json.dll, PE32 35->119 dropped 54 rundll32.exe 35->54         started        121 C:\Users\user\AppData\Local\...\metina_4.tmp, PE32 37->121 dropped 57 metina_4.tmp 37->57         started        197 217.107.34.191 RTCOMM-ASRU Russian Federation 39->197 227 Writes to foreign memory regions 39->227 229 Allocates memory in foreign processes 39->229 231 Sample uses process hollowing technique 39->231 233 Injects a PE file into a foreign processes 39->233 61 AddInProcess32.exe 39->61         started        123 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 42->123 dropped 235 DLL reload attack detected 42->235 237 Renames NTDLL to bypass HIPS 42->237 239 Checks if the current machine is a virtual machine (disk enumeration) 42->239 63 explorer.exe 42->63 injected 199 104.17.62.50 CLOUDFLARENETUS United States 44->199 65 WerFault.exe 44->65         started        201 208.95.112.1 TUT-ASUS United States 46->201 205 4 other IPs or domains 46->205 125 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 46->125 dropped 67 6 other processes 46->67 file13 signatures14 process15 dnsIp16 69 FP6RL983LC0XWAZNWT8L10GP.exe 48->69         started        73 conhost.exe 48->73         started        75 TCHVW8XHMTZ45XRVOJLS3Q7V.exe 50->75         started        78 conhost.exe 50->78         started        80 conhost.exe 52->80         started        82 taskkill.exe 52->82         started        221 Writes to foreign memory regions 54->221 223 Allocates memory in foreign processes 54->223 225 Creates a thread in another existing process (thread injection) 54->225 84 svchost.exe 54->84 injected 88 2 other processes 54->88 185 198.54.126.101 NAMECHEAP-NETUS United States 57->185 151 C:\Users\user\...\djhdfu_____________.exe, PE32 57->151 dropped 153 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 57->153 dropped 155 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 57->155 dropped 157 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 57->157 dropped 86 djhdfu_____________.exe 57->86         started        187 80.92.206.22 HELIOSNET-ASRU Russian Federation 61->187 189 52.255.188.83 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 65->189 159 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 65->159 dropped file17 signatures18 process19 dnsIp20 173 35.198.40.70 GOOGLEUS United States 69->173 175 35.198.59.251 GOOGLEUS United States 69->175 177 8.211.6.12 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 69->177 135 C:\Users\user\AppData\...\40593506171.exe, PE32 69->135 dropped 137 C:\Users\user\AppData\...\76965307509.exe, PE32 69->137 dropped 139 C:\Users\user\AppData\...\66341392083.exe, PE32 69->139 dropped 147 6 other files (none is malicious) 69->147 dropped 90 cmd.exe 69->90         started        241 Detected unpacking (changes PE section rights) 75->241 243 Sets debug register (to hijack the execution of another thread) 84->243 245 Modifies the context of a thread in another process (thread injection) 84->245 92 svchost.exe 84->92         started        96 svchost.exe 84->96         started        179 198.54.116.159 NAMECHEAP-NETUS United States 86->179 181 2.20.142.210 AKAMAI-ASN1EU European Union 86->181 183 2 other IPs or domains 86->183 141 C:\Program Files (x86)\...\Vaehawovaejy.exe, PE32 86->141 dropped 143 C:\...\Vaehawovaejy.exe.config, XML 86->143 dropped 145 C:\Users\user\AppData\...\Syrikaedoki.exe, PE32 86->145 dropped 149 2 other files (none is malicious) 86->149 dropped 247 Detected unpacking (overwrites its own PE header) 86->247 file21 signatures22 process23 dnsIp24 98 40593506171.exe 90->98         started        103 conhost.exe 90->103         started        191 198.13.62.186 AS-CHOOPAUS United States 92->191 249 Query firmware table information (likely to detect VMs) 92->249 signatures25 process26 dnsIp27 163 195.201.225.248 HETZNER-ASDE Germany 98->163 165 34.88.52.57 GOOGLEUS United States 98->165 127 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 98->127 dropped 129 C:\Users\user\AppData\...\vcruntime140.dll, PE32 98->129 dropped 131 C:\Users\user\AppData\...\ucrtbase.dll, PE32 98->131 dropped 133 56 other files (none is malicious) 98->133 dropped 217 Tries to steal Mail credentials (via file access) 98->217 219 Tries to harvest and steal browser information (history, passwords, etc) 98->219 file28 signatures29
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-06-01 10:29:25 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:cryptbot family:glupteba family:metasploit family:plugx family:raccoon family:redline family:smokeloader family:vidar botnet:mix 09.06 botnet:sevlyla2 aspackv2 backdoor discovery dropper evasion infostealer loader persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
Checks for common network interception software
CryptBot
CryptBot Payload
Glupteba
Glupteba Payload
MetaSploit
PlugX
Raccoon
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
ergerge.top:80
olmjby22.top
mortyl02.top
185.215.113.17:18597
Unpacked files
SH256 hash:
f7a22d383fb7c74e0e9b4b3907eeaf44acae4fe4a741face453d107eadd9ccfe
MD5 hash:
aabc7a3044ba7ea1594c0eab199d9547
SHA1 hash:
8d4143739f9c32c66ad6ac096cec8b6725f20218
SH256 hash:
b0db2125ca1e06878a03c3051e459532cf9f61a7266ed11ec5c30ea63558aa46
MD5 hash:
d96d1e3735bfb894fbb14533b1b85886
SHA1 hash:
e97e1648609e47314e3a3431a11bc25ad4b30b73
SH256 hash:
aaaa54339d43ffc3aa9728557d91a90a246dedc070e398919bcc3ee1809c922a
MD5 hash:
f5f1fb47109e5f7111e0a5b7eb98a14b
SHA1 hash:
d03be54360caa04085c97a726c5c11fd82954ac1
SH256 hash:
dd76dacb4cf77726e95ed79f9ca5a56e878da89902c0eacb7c146e40122549b3
MD5 hash:
c4d8e5ea0d18d418c41145116ff52fe4
SHA1 hash:
00fe4def6d8e3a9fbec9ca61096d5457804dcf12
SH256 hash:
0edfac6be11732ddd99db66821ee47408c2dc1e9bed68e5ef9a8e130c565b79b
MD5 hash:
cbd6029abaa8e977d3b7435c6f70dd0e
SHA1 hash:
ebb89d4d7659ef77b658a86ad00dba0ead869f4c
SH256 hash:
9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc
MD5 hash:
957460132c11b2b5ea57964138453b00
SHA1 hash:
12e46d4c46feff30071bf8b0b6e13eabba22237f
SH256 hash:
664003cbe6a433ee57676929e973a5efe2644429ceeb348323ff70ed93e94d1e
MD5 hash:
890a74f18cc8b987518fe98e44c7b486
SHA1 hash:
af1381401d6ff9a3c7469ffad2fd5838890a4d95
SH256 hash:
9e3457bb7bd7b6f262c2f52c3c542afb307052c013f627c416904eb3c91c5c96
MD5 hash:
3ef62e0c3f02177f37f37bf5d2e127e1
SHA1 hash:
aed9c80d0634e1681dc254fdca4ae4303e3ed8e1
SH256 hash:
6ae99643c3af37c4072d036880f78fb10e108e8f78af4747e2bc95646c47813a
MD5 hash:
7a9b617d2426f03acfd065780311bed6
SHA1 hash:
7f7d40307eadfe247e52620de2f7145d893a059f
SH256 hash:
eb3691d3a707c8b1d5b45402ef3344d7e6388eaac64065a13cf5c9afa53a2b01
MD5 hash:
3038ae600c1657fad2fdc1a3072820d2
SHA1 hash:
6a855667f0219302dbe1ab2c80feb56c8822051b
SH256 hash:
e7faa3a7c9d35c2cf49663b924c598fefe3767ef6787e5bfad610b2b57667653
MD5 hash:
2758473da79160c0936b123ac394da7d
SHA1 hash:
3830258479208107beef1421e258b83c7b862c57
SH256 hash:
16475b2a669b3861115e4d166097006d9a523b4e73be8446efc166fdee8174f3
MD5 hash:
6024b3fd3069c2492fdc0b22626cf78c
SHA1 hash:
2e2ca98c9e2f9f8b41557c1bda11fc27ff8f5804
SH256 hash:
08e7bd0f28b7ce09922bf6551be3475075594da2343352dfa547b2dc601603e5
MD5 hash:
86e3a2e9d9bf3df4d5fec1f0b7074b02
SHA1 hash:
2315e22fe1fe767a29f4e98844c9307019075803
SH256 hash:
3b525e40f2527bc0f960436be192094f40177dcf7296aaf6c34a6241fe023fa8
MD5 hash:
5875fa588354cd2336c0bfcf1941c283
SHA1 hash:
1869d91acb9b958f24ef65ecc79bdf2f72ea0066
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
c27347e5e529d3d81d82936bb2badb2b2780da2a5bdf339f29e45d3b5263fe84
MD5 hash:
4247b01f4ee77246194cc8c1efacf66d
SHA1 hash:
7f2f471739bc14f85245def64309df6cbc0d1056
SH256 hash:
e0967e82282fd8bf7a13818b8dfa8ab2fc2859e88b5dbeabc23db25704d01acc
MD5 hash:
233eb27f1246c03d49dbf085344df0ea
SHA1 hash:
c3e0c04ed8e02ca5728a087cad7b15ff0e0c46d5
SH256 hash:
5e91e00023b218192fedea7ceee4acb4f2ce2d53b043f097aaaaed1adc5f797d
MD5 hash:
451560554b1acf317e1f04e0d3d0332d
SHA1 hash:
c65f5e3f20ee5fc3d1add194fe187174e9ba4666
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
5ece776bbf4a6351917d802021d5675f3cac8f7ced311e2b33ede35cf056ae25
MD5 hash:
ab85c8d1599be03b861b80ed4b622641
SHA1 hash:
e4f71414829946df901a1d1bde10cd7da6f505d7
SH256 hash:
08e74804dbce755393239ab96ac551ef5ebd854f1061fea263ad3282c860b0fa
MD5 hash:
06bacc55546ac250e33ff2d803c7e477
SHA1 hash:
f6112f624fd737ee5d432056458b8e297850909b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICOIUS_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments