MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54f791796231f7899d753f0ba44e7387bf7748dc7a28adbd28f2067c9ab88605. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cryptbot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 54f791796231f7899d753f0ba44e7387bf7748dc7a28adbd28f2067c9ab88605
SHA3-384 hash: 64f9adc2d681e01026125d5e8aae8a4361cf661db1b3911c53a57ea45963491618197809cdb6919984980bff7f6c100e
SHA1 hash: ae312df78a6eeecc0fa90ed8d1e6a717b7ef4262
MD5 hash: 6ffb9cf7aac379e11b55f43921a93118
humanhash: iowa-seven-california-alabama
File name:6ffb9cf7aac379e11b55f43921a93118.exe
Download: download sample
Signature Cryptbot
File size:1'796'460 bytes
First seen:2021-07-15 09:40:52 UTC
Last seen:2021-07-15 11:21:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e04eb610508ddb951732064297e50b65 (6 x CryptBot)
ssdeep 49152:X1naABhJLh21Cgv8XPdZgjswOIAnuKs2Ear:X11JQ1CgvMd68nuKQar
Threatray 314 similar samples on MalwareBazaar
TLSH T1BD85BC01E697936AC2A7F3FDB91DF6345565AC3F032001CB33B4FEC669E09906A25632
Reporter abuse_ch
Tags:CryptBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6ffb9cf7aac379e11b55f43921a93118.exe
Verdict:
Malicious activity
Analysis date:
2021-07-15 10:05:42 UTC
Tags:
trojan stealer loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
60 / 100
Signature
Contains functionality to register a low level keyboard hook
Found many strings related to Crypto-Wallets (likely being stolen)
Obfuscated command line found
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 449235 Sample: YYK886IH7Z.exe Startdate: 15/07/2021 Architecture: WINDOWS Score: 60 36 Found many strings related to Crypto-Wallets (likely being stolen) 2->36 9 YYK886IH7Z.exe 7 2->9         started        process3 signatures4 38 Contains functionality to register a low level keyboard hook 9->38 12 cmd.exe 1 9->12         started        process5 signatures6 40 Submitted sample is a known malware sample 12->40 42 Obfuscated command line found 12->42 44 Uses ping.exe to sleep 12->44 46 Uses ping.exe to check the status of other devices and networks 12->46 15 cmd.exe 3 12->15         started        18 conhost.exe 12->18         started        process7 signatures8 48 Obfuscated command line found 15->48 50 Uses ping.exe to sleep 15->50 20 PING.EXE 1 15->20         started        23 Certe.exe.com 15->23         started        25 findstr.exe 1 15->25         started        process9 dnsIp10 30 127.0.0.1 unknown unknown 20->30 32 192.168.2.1 unknown unknown 20->32 27 Certe.exe.com 23->27         started        process11 dnsIp12 34 cIymuknYDYAeNlatDP.cIymuknYDYAeNlatDP 27->34
Threat name:
Win32.Spyware.AveMaria
Status:
Malicious
First seen:
2021-07-15 09:41:08 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Unpacked files
SH256 hash:
f10eaff1a6e7bcf03cccecc19a2696f76f5a685a0c5bbd6dfbc2d47838c2ffce
MD5 hash:
422be91874980bc78f5cef4c58b98933
SHA1 hash:
146b01a20a1a2f4a667c14c0b0f82c1c0012a84e
SH256 hash:
54f791796231f7899d753f0ba44e7387bf7748dc7a28adbd28f2067c9ab88605
MD5 hash:
6ffb9cf7aac379e11b55f43921a93118
SHA1 hash:
ae312df78a6eeecc0fa90ed8d1e6a717b7ef4262
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cryptbot

Executable exe 54f791796231f7899d753f0ba44e7387bf7748dc7a28adbd28f2067c9ab88605

(this sample)

  
Delivery method
Distributed via web download

Comments