MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0dc4dbf92417c9701a2ffd8c3446bed02811bb18d245e0bf372ce0b2db92172d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: 0dc4dbf92417c9701a2ffd8c3446bed02811bb18d245e0bf372ce0b2db92172d
SHA3-384 hash: 083cc5d6771a4ee0cd958097bae1a09d90449068afe69ea74513a7b0839308b96d0bc937717e70fd33da226930a6af61
SHA1 hash: 86e4114602a51d08e0d00021ff73312a3d54432b
MD5 hash: 7f99fdb03f82aa3235a24833a9e3d70a
humanhash: idaho-hamper-gee-edward
File name:grabbot_0.1.6.3.vir
Download: download sample
Signature ZeuS
File size:376'832 bytes
First seen:2020-07-19 17:16:06 UTC
Last seen:2020-07-19 19:13:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 75c16aa245fffae18cee53f6ab719b78
ssdeep 6144:TDiT1GqmQBuE53ytPAkJcz7p6TFlBKyis6txq1jk9aKzcTGBzzgMV:TLQP3wAkJcnp6TFlAyi9/qZKgTGBXt
TLSH 898402F7A3C69535E97603B6DA13E30B188DC9FC8E8D051532AC394911D62E13DAA7EC
Reporter @tildedennis
Tags:grabbot ZeuS


Twitter
@tildedennis
grabbot version 0.1.6.3

Intelligence


File Origin
# of uploads :
2
# of downloads :
19
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Connection attempt to an infection source
Threat name:
Win32.Trojan.Caphaw
Status:
Malicious
First seen:
2016-01-28 01:15:00 UTC
AV detection:
24 of 31 (77.42%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence spyware
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
Checks whether UAC is enabled
Adds Run key to start application
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments