MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ffa9641556c11890735aba122f4ebf94370fb4aab8c613f5025df7559214f51. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 9


Intelligence 9 IOCs 2 YARA 2 File information Comments

SHA256 hash: 0ffa9641556c11890735aba122f4ebf94370fb4aab8c613f5025df7559214f51
SHA3-384 hash: ec27c3866726607781fe45b411b997a0abef2665eecbb1f9297ac9da369950fa048f0995559fc6b5369a4029a11b1d83
SHA1 hash: 5d95878467c589fb25d101d38922b3fd3f8d170f
MD5 hash: 7084966d9a406d1719dbb913004ce10d
humanhash: march-yankee-xray-river
File name:7084966D9A406D1719DBB913004CE10D.exe
Download: download sample
Signature CryptBot
File size:412'160 bytes
First seen:2021-07-02 20:55:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d610ab0a9dc87feb2ab95c8f8bf96e81 (1 x CryptBot)
ssdeep 6144:V+n85Hu3WW7P4FK1Kdwzchx8cb+0AG4ZNQFCrCB24kvibAbUrtalDnbZNaxGZ:VLsPv1Kdwz4xh+g4ZHCk7icbUkF1
TLSH A6949D10B691C035F5B212F88A7AE7BC653D7AE05B2450CB62D4FAEE5A346E1EC31317
Reporter abuse_ch
Tags:CryptBot exe


Avatar
abuse_ch
CryptBot C2:
http://xeieib52.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://xeieib52.top/index.php https://threatfox.abuse.ch/ioc/157138/
http://moraid05.top/index.php https://threatfox.abuse.ch/ioc/157139/

Intelligence


File Origin
# of uploads :
1
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7084966D9A406D1719DBB913004CE10D.exe
Verdict:
Malicious activity
Analysis date:
2021-07-02 21:01:17 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Clipboard Hijacker Cryptbot Glupteba Red
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample or dropped binary is a compiled AutoHotkey binary
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Submitted sample is a known malware sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Clipboard Hijacker
Yara detected Cryptbot
Yara detected Evader
Yara detected Glupteba
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 443689 Sample: y00DKgqMFs.exe Startdate: 02/07/2021 Architecture: WINDOWS Score: 100 152 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->152 154 Multi AV Scanner detection for domain / URL 2->154 156 Found malware configuration 2->156 158 18 other signatures 2->158 14 y00DKgqMFs.exe 29 2->14         started        19 SmartClock.exe 2->19         started        21 SmartClock.exe 2->21         started        process3 dnsIp4 140 g-partners.top 159.65.63.164, 49723, 49724, 49726 DIGITALOCEAN-ASNUS United States 14->140 142 lopoga07.top 47.243.129.23, 49733, 49735, 49737 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 14->142 144 3 other IPs or domains 14->144 108 C:\Users\user\AppData\...\48859113612.exe, PE32 14->108 dropped 110 C:\Users\user\AppData\...\48049122777.exe, PE32 14->110 dropped 112 C:\Users\user\AppData\...\39886162265.exe, PE32 14->112 dropped 114 6 other files (4 malicious) 14->114 dropped 146 Detected unpacking (changes PE section rights) 14->146 148 Detected unpacking (overwrites its own PE header) 14->148 150 May check the online IP address of the machine 14->150 23 cmd.exe 1 14->23         started        25 cmd.exe 1 14->25         started        27 cmd.exe 1 14->27         started        30 cmd.exe 14->30         started        file5 signatures6 process7 signatures8 32 48049122777.exe 8 23->32         started        37 conhost.exe 23->37         started        39 39886162265.exe 48 25->39         started        41 conhost.exe 25->41         started        184 Submitted sample is a known malware sample 27->184 186 Obfuscated command line found 27->186 188 Uses ping.exe to sleep 27->188 190 Uses ping.exe to check the status of other devices and networks 27->190 43 48859113612.exe 15 29 27->43         started        45 conhost.exe 27->45         started        47 conhost.exe 30->47         started        49 taskkill.exe 30->49         started        process9 dnsIp10 116 nailedpizza.top 32->116 118 iplogger.org 32->118 94 C:\Users\user\AppData\...\edspolishpp.exe, PE32 32->94 dropped 160 Multi AV Scanner detection for dropped file 32->160 162 Detected unpacking (changes PE section rights) 32->162 164 Detected unpacking (overwrites its own PE header) 32->164 174 3 other signatures 32->174 51 edspolishpp.exe 32->51         started        120 moraid05.top 178.62.84.251, 49767, 80 DIGITALOCEAN-ASNUS European Union 39->120 122 xeieib52.top 143.110.219.141, 49762, 80 COLLEGE-OF-ST-SCHOLASTICAUS United States 39->122 124 lopoga07.top 39->124 96 C:\Users\user\AppData\Local\Temp\SgseB.exe, PE32 39->96 dropped 166 Tries to harvest and steal browser information (history, passwords, etc) 39->166 55 cmd.exe 39->55         started        57 cmd.exe 39->57         started        126 135.181.220.99, 17984, 49744, 49751 HETZNER-ASDE Germany 43->126 128 api.ip.sb 43->128 168 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 43->168 170 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 43->170 172 Tries to steal Crypto Currency Wallets 43->172 file11 signatures12 process13 dnsIp14 130 185.215.113.17, 18597, 49754, 49756 WHOLESALECONNECTIONSNL Portugal 51->130 132 api.ip.sb 51->132 176 Detected unpacking (changes PE section rights) 51->176 178 Detected unpacking (overwrites its own PE header) 51->178 180 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 51->180 182 3 other signatures 51->182 59 SgseB.exe 55->59         started        64 conhost.exe 55->64         started        66 conhost.exe 57->66         started        68 timeout.exe 57->68         started        signatures15 process16 dnsIp17 136 192.168.2.1 unknown unknown 59->136 100 C:\Users\user\AppData\Local\Temp\...\vpn.exe, PE32 59->100 dropped 102 C:\Users\user\AppData\Local\Temp\...\4.exe, PE32 59->102 dropped 104 C:\Users\user\AppData\Local\Temp\...\UAC.dll, PE32 59->104 dropped 106 3 other files (none is malicious) 59->106 dropped 192 Multi AV Scanner detection for dropped file 59->192 194 Machine Learning detection for dropped file 59->194 70 vpn.exe 59->70         started        72 4.exe 59->72         started        file18 signatures19 process20 file21 75 cmd.exe 70->75         started        98 C:\Users\user\AppData\...\SmartClock.exe, PE32 72->98 dropped 77 SmartClock.exe 72->77         started        process22 process23 79 cmd.exe 75->79         started        82 conhost.exe 75->82         started        signatures24 196 Obfuscated command line found 79->196 198 Uses ping.exe to sleep 79->198 84 Accompagna.exe.com 79->84         started        86 PING.EXE 79->86         started        89 findstr.exe 79->89         started        process25 dnsIp26 91 Accompagna.exe.com 84->91         started        134 127.0.0.1 unknown unknown 86->134 process27 dnsIp28 138 WYEnXVSECgshKtHcubAXXu.WYEnXVSECgshKtHcubAXXu 91->138
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-07-02 03:26:00 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:cryptbot family:redline family:vidar botnet:installshop botnet:mix 03.07 discovery infostealer spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Deletes itself
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
CryptBot
CryptBot Payload
RedLine
RedLine Payload
Vidar
Malware Config
C2 Extraction:
135.181.220.99:17984
xeieib52.top
moraid05.top
185.215.113.17:18597
Unpacked files
SH256 hash:
5ae7ee8f894b4acf5f4c841bc85ccd53ca04cc79a73fd84cec8ee5381ac94aff
MD5 hash:
c3931474ded1e643d4f47ad1773d4a58
SHA1 hash:
584254fe35335371cec0fbd5471322af569893f6
SH256 hash:
0ffa9641556c11890735aba122f4ebf94370fb4aab8c613f5025df7559214f51
MD5 hash:
7084966d9a406d1719dbb913004ce10d
SHA1 hash:
5d95878467c589fb25d101d38922b3fd3f8d170f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments