MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3d364150c09d1f0c4a9eab0144fb4754bdcfa96ad1d0bd874308e625c5958b75. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cryptbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 3d364150c09d1f0c4a9eab0144fb4754bdcfa96ad1d0bd874308e625c5958b75
SHA3-384 hash: b5403aa165ae573ec1e9093e19afb5f40a505b8ca110ed77a852ee04ea8421d6436f98919ae19d3da6dfd0e86a7528f1
SHA1 hash: 05d4f9b76adf28485bd8fa0b74412746b98c9d8c
MD5 hash: bcd4db4df2b58bfb92a5c7e7395abd99
humanhash: glucose-spring-mike-chicken
File name:bcd4db4df2b58bfb92a5c7e7395abd99.exe
Download: download sample
Signature Cryptbot
File size:1'908'631 bytes
First seen:2021-07-17 09:47:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 524711ec9c5a149fe3bf3479d0b505b6 (3 x Cryptbot)
ssdeep 49152:pJlN6I4kYlok9rVY1ODeW/eVITGjtVszOIRD50pP6lu:pJqIbk9qE/owybMR9Nlu
Threatray 389 similar samples on MalwareBazaar
TLSH T1AF9522017B94C772C66C03FE4B64F1B622B4ADF3021788D7BB743ACA7D70E95A629185
Reporter abuse_ch
Tags:CryptBot exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
167
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bcd4db4df2b58bfb92a5c7e7395abd99.exe
Verdict:
Malicious activity
Analysis date:
2021-07-17 09:50:29 UTC
Tags:
trojan stealer loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Regsvr32 Anomaly
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Cryptbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 450210 Sample: qs3SXQ46BN.exe Startdate: 17/07/2021 Architecture: WINDOWS Score: 100 37 Found malware configuration 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 5 other signatures 2->43 9 qs3SXQ46BN.exe 7 2->9         started        process3 signatures4 45 Contains functionality to register a low level keyboard hook 9->45 12 cmd.exe 1 9->12         started        process5 signatures6 47 Submitted sample is a known malware sample 12->47 49 Obfuscated command line found 12->49 51 Uses ping.exe to sleep 12->51 53 Uses ping.exe to check the status of other devices and networks 12->53 15 cmd.exe 3 12->15         started        18 conhost.exe 12->18         started        process7 signatures8 55 Obfuscated command line found 15->55 57 Uses ping.exe to sleep 15->57 20 PING.EXE 1 15->20         started        23 findstr.exe 1 15->23         started        26 Braccio.exe.com 15->26         started        process9 dnsIp10 33 127.0.0.1 unknown unknown 20->33 31 C:\Users\user\AppData\...\Braccio.exe.com, Targa 23->31 dropped 28 Braccio.exe.com 26->28         started        file11 process12 dnsIp13 35 vBpxrjgXBjSdUIWlNsBFghKTTMG.vBpxrjgXBjSdUIWlNsBFghKTTMG 28->35
Threat name:
Win32.Trojan.Crypzip
Status:
Malicious
First seen:
2021-07-17 09:48:05 UTC
AV detection:
8 of 46 (17.39%)
Threat level:
  5/5
Result
Malware family:
cryptbot
Score:
  10/10
Tags:
family:cryptbot discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Checks installed software on the system
Accesses cryptocurrency files/wallets, possible credential harvesting
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
CryptBot
Unpacked files
SH256 hash:
6f1ff88a0f7944c920442b387456dff5c6807d4b8918107b08cefd0862647e75
MD5 hash:
6b7b0bdba3a93c863c9cc43100be70a5
SHA1 hash:
9772a0addc1a1dde2751c54bf4ec4da8aaa9225b
SH256 hash:
3d364150c09d1f0c4a9eab0144fb4754bdcfa96ad1d0bd874308e625c5958b75
MD5 hash:
bcd4db4df2b58bfb92a5c7e7395abd99
SHA1 hash:
05d4f9b76adf28485bd8fa0b74412746b98c9d8c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cryptbot

Executable exe 3d364150c09d1f0c4a9eab0144fb4754bdcfa96ad1d0bd874308e625c5958b75

(this sample)

  
Delivery method
Distributed via web download

Comments