MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d090e48369efcdbebf9df5aed96857cd442509bb5f59e171f2b1b3cf1a56361. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 2d090e48369efcdbebf9df5aed96857cd442509bb5f59e171f2b1b3cf1a56361
SHA3-384 hash: b392ffa7571255f5050026f125b5a381f472bd0c2be952c60b9d359700724bd92e7a92cf04d5fecca306b9a3008b5779
SHA1 hash: 33509a78863b9bd7385054aa5bc92b8ce4f1ab5f
MD5 hash: 5a0ea4aab5f283b5c7d234322e04c6ce
humanhash: victor-beryllium-mountain-finch
File name:5a0ea4aab5f283b5c7d234322e04c6ce.exe
Download: download sample
Signature CryptBot
File size:351'232 bytes
First seen:2021-10-03 07:36:11 UTC
Last seen:2021-10-03 08:48:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0af56bf70c7b81394871a4713f3cc30b (3 x RaccoonStealer, 1 x CoinMiner, 1 x CryptBot)
ssdeep 6144:TQovZhTYZt0q9g4vYGDIIMJPdvQIZselS5OH8D7d0qthV07:ThxhYZt00gB6Ir1dImDS5T7d3zV0
Threatray 207 similar samples on MalwareBazaar
TLSH T1EB74BF20B7E0C030F4B756F589B99379AA297EB1A73441CFA3D02AEA56746D4DC30787
File icon (PE):PE icon
dhash icon 48e8e8e8aa62a499 (1 x CryptBot, 1 x RaccoonStealer)
Reporter abuse_ch
Tags:CryptBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
167
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5a0ea4aab5f283b5c7d234322e04c6ce.exe
Verdict:
Malicious activity
Analysis date:
2021-10-03 08:01:50 UTC
Tags:
stealer trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Threat name:
Cryptbot Glupteba
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Cryptbot
Yara detected Glupteba
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.GenSteal
Status:
Malicious
First seen:
2021-10-02 18:19:08 UTC
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
fb68d93118bf52c1a4c3378c810c2d8e3821ed9ad1d6173654a691941340d878
MD5 hash:
5a3f1df984684a9819a9d1a3ff194a69
SHA1 hash:
2dd6e26eb9ad7c67e0ab56a8f8a09f1791d2c197
SH256 hash:
2d090e48369efcdbebf9df5aed96857cd442509bb5f59e171f2b1b3cf1a56361
MD5 hash:
5a0ea4aab5f283b5c7d234322e04c6ce
SHA1 hash:
33509a78863b9bd7385054aa5bc92b8ce4f1ab5f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CryptBot

Executable exe 2d090e48369efcdbebf9df5aed96857cd442509bb5f59e171f2b1b3cf1a56361

(this sample)

  
Delivery method
Distributed via web download

Comments