MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 361dc084efc29ddc0a837710fc28a872389e3a61413e5c82fcbefc1906c7b29f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
CryptBot
Vendor detections: 10
| SHA256 hash: | 361dc084efc29ddc0a837710fc28a872389e3a61413e5c82fcbefc1906c7b29f |
|---|---|
| SHA3-384 hash: | facc9394a25f2b7c883402cc328dd8cf1802c1e0cd8bcd504f2cc7ed05e646ef6ca7f4e3ffc8d97a03ade69242f34e13 |
| SHA1 hash: | 9e0111f30fdb7e9b3a5b5372fed19f8e212dde3f |
| MD5 hash: | e53e5d09597782552953de1b7a74df06 |
| humanhash: | alaska-timing-helium-football |
| File name: | e53e5d09597782552953de1b7a74df06 |
| Download: | download sample |
| Signature | CryptBot |
| File size: | 6'296'195 bytes |
| First seen: | 2021-07-06 01:36:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer) |
| ssdeep | 98304:pAI+5p+goreqMswPavGIM45Uz8hyraVTe5fh8ndVttAwor7B0DIFIT9ZrQIQq+xZ:it5p+gyhio5UzQbM37yDRZcBZ |
| Threatray | 79 similar samples on MalwareBazaar |
| TLSH | 7156332693418977D2A15A35D80FF1BBF42BFB841F7821CF17C4497E6C326292BB4299 |
| Reporter | |
| Tags: | 32 CryptBot exe |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://alemed12.top/index.php | https://threatfox.abuse.ch/ioc/157600/ |
| http://mordmy01.top/index.php | https://threatfox.abuse.ch/ioc/157601/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
119
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
x86_x64_setup.exe
Verdict:
Malicious activity
Analysis date:
2021-07-05 22:42:48 UTC
Tags:
trojan evasion stealer vidar loader rat redline opendir keylogger agenttesla raccoon phishing autoit danabot
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Vidar
Verdict:
Malicious
Result
Threat name:
Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates multiple autostart registry keys
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fabookie
Status:
Malicious
First seen:
2021-07-06 01:37:12 UTC
AV detection:
23 of 46 (50.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 69 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:vidar discovery infostealer persistence stealer upx vmprotect
Behaviour
Modifies system certificate store
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
Vidar
Unpacked files
SH256 hash:
e7ea471d02218191b90911b15cc9991eab28a1047a914c784966ecd182bd499c
MD5 hash:
7f7c75db900d8b8cd21c7a93721a6142
SHA1 hash:
c8b86e62a8479a4e6b958d2917c60dccef8c033f
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
a0c42ce1e2d65be3678c4d398ae1d278724debfd13df186c5f5149f60edec148
MD5 hash:
cad724b3bcc5cdd33a90247073096388
SHA1 hash:
de99ef741fd51302d91709fba8af3b2587203486
SH256 hash:
4fb3c029c0ee96c8e184db0f237b78196a203550572569a19d1abfb5ad92cc2d
MD5 hash:
543a72e4846aa427016eccef85475a6f
SHA1 hash:
7a1c555e41c9da17336aa80f19a97fef161b280e
SH256 hash:
6bea897b06441f33f33764c26f62c206666a204768cf3e5c0ae6912d8e86780f
MD5 hash:
128250f29b71047e68f7b2ba44b10535
SHA1 hash:
fc7fbe41eec8ac9e286451ade80a2f5c7abddc1c
SH256 hash:
5f32b0641ec2d655b227fa0b47de34c9c8a0ce5d8dbef4373b93da7a34cb80d9
MD5 hash:
c96846066afeda582e8d20a927d74cd3
SHA1 hash:
60cddafec86e52ee18fcbe605e4d66277d7b772d
SH256 hash:
867ffa27657903ff4350fcb3ff9a148415fd3510b0ddbb3746b9edb6c52d16d8
MD5 hash:
0f9a4c1f04a82c1de73e08136250c0d8
SHA1 hash:
cef08fd91e6de076ccaf97fb346fd7022acef986
SH256 hash:
08585596c158f669ccc3867dd330448206e4e172d71c8fb37a8a9cdb4b371244
MD5 hash:
fd29450cd97a5c9d7124778f7ac89bdd
SHA1 hash:
eb1310c25770cf9c837430f945ccea760b48fedb
SH256 hash:
361dc084efc29ddc0a837710fc28a872389e3a61413e5c82fcbefc1906c7b29f
MD5 hash:
e53e5d09597782552953de1b7a74df06
SHA1 hash:
9e0111f30fdb7e9b3a5b5372fed19f8e212dde3f
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://4e87beed-34c0-467a-9142-a3fbcaa9f78f.s3.ap-south-1.amazonaws.com/WW/Setup.exe