MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 337b9f5f13ee874ebe70fd5468725b638eb7b62c4f8c91a6e2a7deab8f5edbb6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 337b9f5f13ee874ebe70fd5468725b638eb7b62c4f8c91a6e2a7deab8f5edbb6
SHA3-384 hash: 40d9c7d5efb356414a5bb09a7be94ee2347c6136418b2d2146ceab4c5f0771726f7ba070b45c0fcc9b032d6ff32396b1
SHA1 hash: 9794286bcc437147a847a0ae0e9b6c53c6321ca6
MD5 hash: 5ce78e6071a3d4398df69c1812a979b9
humanhash: romeo-finch-grey-mirror
File name:5ce78e6071a3d4398df69c1812a979b9.exe
Download: download sample
Signature CryptBot
File size:355'328 bytes
First seen:2021-10-02 15:58:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2acca7007d519418a75fa59166363dda (6 x RaccoonStealer, 5 x RedLineStealer, 2 x ArkeiStealer)
ssdeep 6144:hvkbxGgYLBYhM7hRjJXxORdrgBZuX3jiMT0ju90Skw7mMjqN0J0b3Ycl34t:hMdfYLBYy7hRlodr5njpOuqSkwpmTIt
Threatray 470 similar samples on MalwareBazaar
TLSH T1FB74BF31B7A0C035F4B712F445BAC3B9A9297EB19B3441CB63D42BEA56346E49C30B97
File icon (PE):PE icon
dhash icon 68f8c8e8aa66a499 (2 x RaccoonStealer, 1 x CryptBot)
Reporter abuse_ch
Tags:CryptBot exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
175
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5ce78e6071a3d4398df69c1812a979b9.exe
Verdict:
Malicious activity
Analysis date:
2021-10-02 16:01:52 UTC
Tags:
stealer trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Launching the default Windows debugger (dwwin.exe)
Result
Threat name:
Cryptbot Glupteba
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Cryptbot
Yara detected Glupteba
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-10-02 11:13:16 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery evasion persistence spyware stealer suricata themida trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Deletes itself
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Unpacked files
SH256 hash:
fb68d93118bf52c1a4c3378c810c2d8e3821ed9ad1d6173654a691941340d878
MD5 hash:
5a3f1df984684a9819a9d1a3ff194a69
SHA1 hash:
2dd6e26eb9ad7c67e0ab56a8f8a09f1791d2c197
SH256 hash:
337b9f5f13ee874ebe70fd5468725b638eb7b62c4f8c91a6e2a7deab8f5edbb6
MD5 hash:
5ce78e6071a3d4398df69c1812a979b9
SHA1 hash:
9794286bcc437147a847a0ae0e9b6c53c6321ca6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:MALWARE_Win_CryptBot
Author:ditekSHen
Description:CryptBot/Fugrafa stealer payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CryptBot

Executable exe 337b9f5f13ee874ebe70fd5468725b638eb7b62c4f8c91a6e2a7deab8f5edbb6

(this sample)

  
Delivery method
Distributed via web download

Comments