MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 33ab895e270da5c3783cadbee52e1728500af03fb414520c29f1bebb9fe3c504. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



EpsilonStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 33ab895e270da5c3783cadbee52e1728500af03fb414520c29f1bebb9fe3c504
SHA3-384 hash: c281b7d31f3e2618ef43c57f741041b89c96edaca4000c562a51ffa1785fb579f94aa1a27ac50f261358b732858413e7
SHA1 hash: 8614c64540a1dddadaa93d0674c079b501dd857f
MD5 hash: 770d8a9c6f0cbe97a7b738bb46da1a00
humanhash: alaska-oklahoma-johnny-hydrogen
File name:Beast Conquests.exe
Download: download sample
Signature EpsilonStealer
File size:74'242'211 bytes
First seen:2023-12-28 22:07:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (527 x GuLoader, 110 x RemcosRAT, 80 x EpsilonStealer)
ssdeep 1572864:/4/4rzOchPVTO6DvtS0WeNeGEyvH5lXLf8t7hyTahT6O81em7:QkqcdVTOWw0RpvH5xE9hDGOtm7
Threatray 99 similar samples on MalwareBazaar
TLSH T116F733AAE1419C1BC17035FBBBF45472B21803B489F5E577AAAC34E0D98071A77B872D
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 98e5676565a5a198 (20 x EpsilonStealer, 2 x NovaSentinel, 1 x LummaStealer)
Reporter JaffaCakes118
Tags:EpsilonStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
400
Origin country :
GB GB
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a window
Creating a file
Launching a process
Creating a process with a hidden window
Running batch commands
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Unauthorized injection to a recently created process
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Launching the process to interact with network services
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
48 / 100
Signature
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Suspicious powershell command line found
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1367814 Sample: Beast_Conquests.exe Startdate: 28/12/2023 Architecture: WINDOWS Score: 48 58 www.google.com 2->58 60 transfer.sh 2->60 62 3 other IPs or domains 2->62 9 Beast_Conquests.exe 207 2->9         started        process3 file4 46 C:\Users\user\AppData\Local\...\nsis7z.dll, PE32 9->46 dropped 48 C:\Users\user\AppData\Local\...\System.dll, PE32 9->48 dropped 50 C:\Users\user\AppData\Local\...\vulkan-1.dll, PE32+ 9->50 dropped 52 13 other files (none is malicious) 9->52 dropped 12 Beast Conquests.exe 7 9->12         started        process5 dnsIp6 66 api.gofile.io 51.38.43.18, 443, 49746 OVHFR France 12->66 68 transfer.sh 144.76.136.153, 443, 49747 HETZNER-ASDE Germany 12->68 70 2 other IPs or domains 12->70 54 d56a2a0c-ac89-49e4...1072944969.tmp.node, PE32+ 12->54 dropped 56 8cd3f3a1-8329-44f1...531df2874f.tmp.node, PE32+ 12->56 dropped 16 cmd.exe 12->16         started        19 cmd.exe 12->19         started        21 WMIC.exe 1 12->21         started        23 35 other processes 12->23 file7 process8 dnsIp9 72 Suspicious powershell command line found 16->72 26 conhost.exe 16->26         started        28 powershell.exe 16->28         started        30 conhost.exe 19->30         started        32 powershell.exe 19->32         started        74 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 21->74 34 conhost.exe 21->34         started        64 chrome.cloudflare-dns.com 172.64.41.3, 443, 49743 CLOUDFLARENETUS United States 23->64 36 net.exe 23->36         started        38 WMIC.exe 1 23->38         started        40 tasklist.exe 1 23->40         started        42 59 other processes 23->42 signatures10 process11 process12 44 net1.exe 36->44         started       
Gathering data
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Collects information from the system
Detects videocard installed
Enumerates processes with tasklist
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

EpsilonStealer

Executable exe 33ab895e270da5c3783cadbee52e1728500af03fb414520c29f1bebb9fe3c504

(this sample)

  
Delivery method
Distributed via web download

Comments