MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1913f2f2bed5b14fae809fb0dcb8d35a46f2e4f99fd5c021e8ead58dd9541ece. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 9


Intelligence 9 IOCs 3 YARA 23 File information Comments

SHA256 hash: 1913f2f2bed5b14fae809fb0dcb8d35a46f2e4f99fd5c021e8ead58dd9541ece
SHA3-384 hash: 16944489dbc1bb36708b37508e2658a6b79b5bdbcfdb689471cb06449738a0bbfc3488b2b7c50eb1d67f19f072a6f305
SHA1 hash: c1fc1ca5275e806d5446bc9d8f4dfe6ccde04a15
MD5 hash: 29045a16e92dd7c95fbd0d317ffee047
humanhash: november-vermont-alanine-april
File name:29045A16E92DD7C95FBD0D317FFEE047.exe
Download: download sample
Signature CryptBot
File size:4'703'245 bytes
First seen:2021-07-01 17:30:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:x5Z334WoxvqFhwRgu7bp1r8v//d+ghXxxhxkyTBqmq30K/Yp8hCvLUBsKdFxp:x5Z8sDwRj3p1qH0ghXZRNqb/Q7LUCK7L
Threatray 92 similar samples on MalwareBazaar
TLSH 7326339A3BFA40B6F9598474D88ABB32D5FCD74857200DEB3F94811E2FBD480E60D529
Reporter abuse_ch
Tags:CryptBot exe


Avatar
abuse_ch
CryptBot C2:
http://xeibmh42.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://xeibmh42.top/index.php https://threatfox.abuse.ch/ioc/156889/
http://mororx04.top/index.php https://threatfox.abuse.ch/ioc/156894/
185.200.243.208:31526 https://threatfox.abuse.ch/ioc/156999/

Intelligence


File Origin
# of uploads :
1
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer RedLine SmokeLoader Vi
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Backstage Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 443139 Sample: h3hlbLDpl8.exe Startdate: 01/07/2021 Architecture: WINDOWS Score: 100 120 104.43.139.144 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->120 122 13.64.90.137 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->122 166 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->166 168 Found malware configuration 2->168 170 Antivirus detection for URL or domain 2->170 172 14 other signatures 2->172 12 h3hlbLDpl8.exe 16 2->12         started        signatures3 process4 file5 94 C:\Users\user\AppData\...\setup_install.exe, PE32 12->94 dropped 96 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 12->96 dropped 98 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 12->98 dropped 100 11 other files (none is malicious) 12->100 dropped 15 setup_install.exe 1 12->15         started        process6 dnsIp7 140 motiwa.xyz 104.21.12.59, 49730, 80 CLOUDFLARENETUS United States 15->140 142 127.0.0.1 unknown unknown 15->142 154 Detected unpacking (changes PE section rights) 15->154 156 Performs DNS queries to domains with low reputation 15->156 19 cmd.exe 1 15->19         started        21 cmd.exe 1 15->21         started        23 cmd.exe 1 15->23         started        25 6 other processes 15->25 signatures8 process9 process10 27 arnatic_6.exe 19->27         started        32 arnatic_3.exe 5 21->32         started        34 arnatic_1.exe 91 23->34         started        36 arnatic_8.exe 25->36         started        38 arnatic_2.exe 1 25->38         started        40 arnatic_5.exe 15 8 25->40         started        42 2 other processes 25->42 dnsIp11 126 136.144.41.133, 80 WORLDSTREAMNL Netherlands 27->126 134 10 other IPs or domains 27->134 102 C:\Users\...\z4MXeQyy4YI_10VyUrp1p6aY.exe, PE32 27->102 dropped 104 C:\Users\...\wfWoYm1B5qxLsBqgqrBwTaOY.exe, PE32 27->104 dropped 106 C:\Users\...\vhSrQV9w77NJyN0ZoR96Lym3.exe, PE32 27->106 dropped 112 23 other files (15 malicious) 27->112 dropped 184 Drops PE files to the document folder of the user 27->184 186 Disable Windows Defender real time protection (registry) 27->186 108 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 32->108 dropped 44 rundll32.exe 32->44         started        136 2 other IPs or domains 34->136 114 12 other files (none is malicious) 34->114 dropped 188 Detected unpacking (changes PE section rights) 34->188 190 Detected unpacking (overwrites its own PE header) 34->190 192 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 34->192 206 2 other signatures 34->206 128 192.168.2.1 unknown unknown 36->128 116 3 other files (1 malicious) 36->116 dropped 47 jhuuee.exe 36->47         started        51 UGloryStp.exe 36->51         started        53 liqian.exe 36->53         started        110 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 38->110 dropped 194 DLL reload attack detected 38->194 196 Renames NTDLL to bypass HIPS 38->196 198 Checks if the current machine is a virtual machine (disk enumeration) 38->198 55 explorer.exe 38->55 injected 130 videoconvert-download38.xyz 104.21.42.63, 443, 49734 CLOUDFLARENETUS United States 40->130 132 88.99.66.31 HETZNER-ASDE Germany 40->132 118 4 other files (none is malicious) 40->118 dropped 200 Performs DNS queries to domains with low reputation 40->200 57 4205054.exe 40->57         started        59 1256619.exe 40->59         started        61 2 other processes 40->61 138 4 other IPs or domains 42->138 202 May check the online IP address of the machine 42->202 204 Injects a PE file into a foreign processes 42->204 63 3 other processes 42->63 file12 signatures13 process14 dnsIp15 176 Writes to foreign memory regions 44->176 178 Allocates memory in foreign processes 44->178 180 Creates a thread in another existing process (thread injection) 44->180 65 svchost.exe 44->65 injected 144 157.240.9.35 FACEBOOKUS United States 47->144 146 ip-api.com 47->146 76 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 47->76 dropped 78 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 47->78 dropped 182 May check the online IP address of the machine 47->182 68 jfiag3g_gg.exe 47->68         started        80 C:\Users\user\AppData\Roaming\8300271.exe, PE32 51->80 dropped 82 C:\Users\user\AppData\Roaming\7845566.exe, PE32 51->82 dropped 70 conhost.exe 53->70         started        148 172.67.182.129 CLOUDFLARENETUS United States 57->148 90 7 other files (none is malicious) 57->90 dropped 150 104.21.46.30 CLOUDFLARENETUS United States 59->150 84 C:\ProgramData\73\vcruntime140.dll, PE32 59->84 dropped 86 C:\ProgramData\73\sqlite3.dll, PE32 59->86 dropped 92 5 other files (none is malicious) 59->92 dropped 88 C:\Users\user\AppData\...\WinHoster.exe, PE32 61->88 dropped 152 45.84.0.164 ALEXHOSTMD Russian Federation 63->152 file16 signatures17 process18 signatures19 158 System process connects to network (likely due to code injection or exploit) 65->158 160 Sets debug register (to hijack the execution of another thread) 65->160 162 Modifies the context of a thread in another process (thread injection) 65->162 72 svchost.exe 65->72         started        164 Tries to harvest and steal browser information (history, passwords, etc) 68->164 process20 dnsIp21 124 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 72->124 174 Query firmware table information (likely to detect VMs) 72->174 signatures22
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-06-29 19:59:49 UTC
File Type:
PE (Exe)
Extracted files:
153
AV detection:
28 of 46 (60.87%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:fickerstealer family:glupteba family:metasploit family:plugx family:redline family:smokeloader family:vidar botnet:domani aspackv2 backdoor discovery dropper evasion infostealer loader persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: SetClipboardViewer
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
fickerstealer
Malware Config
C2 Extraction:
ergerr3.top:80
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
a1fae083575d7e76d6058cc985bded369804ff2757336c5d7d8d381076caa28d
MD5 hash:
c1c981ff48980b0e7fae87dbc2c24ea2
SHA1 hash:
1cf231b13ecc26c618f663ae4539904e65414e98
SH256 hash:
664003cbe6a433ee57676929e973a5efe2644429ceeb348323ff70ed93e94d1e
MD5 hash:
890a74f18cc8b987518fe98e44c7b486
SHA1 hash:
af1381401d6ff9a3c7469ffad2fd5838890a4d95
SH256 hash:
a3dbf0dd41e2dd052b809aa7e1babdad8a13b63fd2327e58f96ed405a25b1a0a
MD5 hash:
1364cb5f747d99f27ab2fa00545c3312
SHA1 hash:
c173f566b773c9c3523f0100b518361b9a7b6d22
SH256 hash:
10a122bd647c88aa23f96687e26b251862e83be9dbb89532f4a578689547972d
MD5 hash:
89c739ae3bbee8c40a52090ad0641d31
SHA1 hash:
d0f7dc9a0a3e52af0f9f9736f26e401636c420a1
SH256 hash:
c8fba96479eb7abb3d97106f2b0bc1f13e703a76b418738ff1eb7cb62583578e
MD5 hash:
1fccfed1c284f63e3f052170a2610643
SHA1 hash:
6e72e04a476a96a20c8956dc1640858dd0fcb7c8
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
b31c55f3834347ed2a368ee1496cf56bb20ed52d5d9ba525d4a41f33088084e0
MD5 hash:
9cf6230c41e7d631df7739964aacfdc8
SHA1 hash:
c55ba25a796378fdffbc61383ad4edc660a90417
SH256 hash:
4851881e3c232f19d6adfc3f10fa24efb3bcf667e30200e4ed5d1457740a3cd5
MD5 hash:
78030f36d27f60f15d2e0d9f7315cb4a
SHA1 hash:
77345cef5795f724ea4bfdb0271c864826f3662f
SH256 hash:
7bee57f9b847de271f526f9bca03cab459b7f51aec5e740587fa93fbb72fa4e9
MD5 hash:
e559ba3b753e3436067d4c3dbd262670
SHA1 hash:
4594839861a5ed4ef2f2661918fb6d947d28ae8f
SH256 hash:
00d09d8ed7454db00269d089f28be3b2e6d2361b3d79b390980a2903a9388024
MD5 hash:
171251b4eab6944ed501b83cbbf69d27
SHA1 hash:
452a5deb7a85323aeebc12baf32eab734c0a5109
SH256 hash:
f4031df5e0df4785513fd9fc9843e0aba4623e61b58cd163354ea64f9133b388
MD5 hash:
bdd81266d64b5a226dd38e4decd8cc2c
SHA1 hash:
2395557e0d8fd9bcfe823391a9a7cfe78ee0551a
SH256 hash:
876a851a706d7505a882499c331561ae6f7066b70e240a635a0b0f197fc9285e
MD5 hash:
31f0641b79d0f0d0563802becac03307
SHA1 hash:
b6a2a6cad7578237bb0bd5c1ec36ad5be6647399
SH256 hash:
1913f2f2bed5b14fae809fb0dcb8d35a46f2e4f99fd5c021e8ead58dd9541ece
MD5 hash:
29045a16e92dd7c95fbd0d317ffee047
SHA1 hash:
c1fc1ca5275e806d5446bc9d8f4dfe6ccde04a15
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICOIUS_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments