MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d500524991ad1e6178b097b7ee5e270eef3710115b72a424b7fb2643490f992. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 8


Intelligence 8 IOCs 3 YARA File information Comments

SHA256 hash: 5d500524991ad1e6178b097b7ee5e270eef3710115b72a424b7fb2643490f992
SHA3-384 hash: 8669cb46b1ff34044e8bb26567905917c5ddeb56437e450a953411aa42e7daba9c155f2a2a03f6f002572975acae8e55
SHA1 hash: 781e0cdc5b1c72f217f54bedd2c2862c73604e89
MD5 hash: 33d711ccfe4a4e9cbd37c99e25c13769
humanhash: neptune-uniform-oregon-crazy
File name:33D711CCFE4A4E9CBD37C99E25C13769.exe
Download: download sample
Signature CryptBot
File size:783'872 bytes
First seen:2021-06-25 19:45:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9b239827ad94cf9e43aed2c8aec6e783 (3 x CryptBot, 2 x PrivateLoader, 1 x FickerStealer)
ssdeep 12288:DPkEGt/xf+OeO+OeNhBBhhBBOsdVrmykJpcHRQMRTFhu26loXKHEu4uLv7pC3yeS:DPkEBKnJGbZ6HXv7pC3yedQFyJ5JbTTE
Threatray 308 similar samples on MalwareBazaar
TLSH 6AF48E10B783D071E8B205F558B9AB6A547CBC1407389EEBB3D43F6D49391C22E36E5A
Reporter abuse_ch
Tags:CryptBot exe


Avatar
abuse_ch
CryptBot C2:
http://cypfst52.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://cypfst52.top/index.php https://threatfox.abuse.ch/ioc/153721/
http://morons05.top/index.php https://threatfox.abuse.ch/ioc/153722/
195.2.78.147:54937 https://threatfox.abuse.ch/ioc/153751/

Intelligence


File Origin
# of uploads :
1
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
33D711CCFE4A4E9CBD37C99E25C13769.exe
Verdict:
No threats detected
Analysis date:
2021-06-25 19:47:59 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Vidar Glupteba RedLine SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Detected Info Stealer Vidar
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
May modify the system service descriptor table (often done to hook functions)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sample is protected by VMProtect
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Glupteba
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 440704 Sample: HXTO2yN6fY.exe Startdate: 25/06/2021 Architecture: WINDOWS Score: 100 126 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->126 128 Multi AV Scanner detection for domain / URL 2->128 130 Found malware configuration 2->130 132 20 other signatures 2->132 8 HXTO2yN6fY.exe 4 49 2->8         started        13 svchost.exe 2->13         started        15 explorer.exe 2->15         started        process3 dnsIp4 112 136.144.41.152, 49740, 80 WORLDSTREAMNL Netherlands 8->112 114 freeprivacytoolsforyou.xyz 212.80.219.75, 49748, 80 SERVERIUS-ASNL Lithuania 8->114 116 10 other IPs or domains 8->116 92 C:\Users\...\sKThQvxm_rfS4IDEWgGbvWfp.exe, PE32 8->92 dropped 94 C:\Users\...\gYTD6QM_BCG_SiraNPZk7Izv.exe, PE32 8->94 dropped 96 C:\Users\...\gOb2behBe_fMwRckOqlRar3d.exe, PE32 8->96 dropped 98 29 other files (16 malicious) 8->98 dropped 156 Drops PE files to the document folder of the user 8->156 158 May check the online IP address of the machine 8->158 160 Performs DNS queries to domains with low reputation 8->160 162 Disable Windows Defender real time protection (registry) 8->162 17 D2QXuNrQAnJd2qFpWpZoC8SL.exe 8->17         started        20 gYTD6QM_BCG_SiraNPZk7Izv.exe 8->20         started        23 2UqWJuBhtKE4AL1N2d8Pk77A.exe 14 12 8->23         started        28 13 other processes 8->28 164 System process connects to network (likely due to code injection or exploit) 13->164 166 Sets debug register (to hijack the execution of another thread) 13->166 168 Modifies the context of a thread in another process (thread injection) 13->168 25 svchost.exe 13->25         started        file5 signatures6 process7 dnsIp8 78 132 other files (none is malicious) 17->78 dropped 30 powershell.exe 17->30         started        134 DLL reload attack detected 20->134 136 Contains functionality to inject code into remote processes 20->136 138 Injects a PE file into a foreign processes 20->138 33 gYTD6QM_BCG_SiraNPZk7Izv.exe 20->33         started        66 C:\Program Files (x86)\...\md8_8eus.exe, PE32 23->66 dropped 68 C:\Program Files (x86)\Company\...\jooyu.exe, PE32 23->68 dropped 70 C:\Program Files (x86)\...\jingzhang.exe, PE32 23->70 dropped 80 2 other files (1 malicious) 23->80 dropped 36 jooyu.exe 23->36         started        39 md8_8eus.exe 23->39         started        41 jingzhang.exe 23->41         started        43 file4.exe 23->43         started        118 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 25->118 140 Query firmware table information (likely to detect VMs) 25->140 120 g-partners.top 138.68.187.227 DIGITALOCEAN-ASNUS United States 28->120 122 g-partners.in 28->122 124 6 other IPs or domains 28->124 72 C:\Users\user\AppData\...\37092134926.exe, PE32 28->72 dropped 74 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 28->74 dropped 76 C:\ProgramData\...\information.txt, ISO-8859 28->76 dropped 82 22 other files (2 malicious) 28->82 dropped 142 Detected Info Stealer Vidar 28->142 144 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 28->144 146 May check the online IP address of the machine 28->146 148 5 other signatures 28->148 45 cmd.exe 28->45         started        47 rundll32.exe 28->47         started        49 5 other processes 28->49 file9 signatures10 process11 dnsIp12 51 conhost.exe 30->51         started        84 C:\Users\user\AppData\Local\Temp\AE30.tmp, PE32 33->84 dropped 170 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 33->170 172 Renames NTDLL to bypass HIPS 33->172 174 Checks if the current machine is a virtual machine (disk enumeration) 33->174 100 www.facebook.com 36->100 102 star-mini.c10r.facebook.com 36->102 104 ip-api.com 36->104 53 jfiag3g_gg.exe 36->53         started        56 jfiag3g_gg.exe 36->56         started        106 101.36.107.74 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 39->106 108 iplis.ru 88.99.66.31 HETZNER-ASDE Germany 39->108 110 iplogger.org 39->110 86 C:\Users\user\Documents\...\md8_8eus.exe, PE32 39->86 dropped 88 C:\Users\user\AppData\Local\...\install.dll, PE32 41->88 dropped 90 C:\Users\user\AppData\...90ewtonsoft.Json.dll, PE32 41->90 dropped 58 conhost.exe 41->58         started        60 rundll32.exe 41->60         started        62 37092134926.exe 45->62         started        64 conhost.exe 45->64         started        176 Writes to foreign memory regions 47->176 178 Allocates memory in foreign processes 47->178 file13 signatures14 process15 signatures16 150 Tries to harvest and steal browser information (history, passwords, etc) 53->150 152 Sample uses process hollowing technique 62->152 154 Injects a PE file into a foreign processes 62->154
Threat name:
Win32.Spyware.Fbkatz
Status:
Malicious
First seen:
2021-06-23 01:01:38 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:cryptbot family:fickerstealer family:glupteba family:metasploit family:plugx family:redline family:smokeloader family:vidar botnet:25_6_r botnet:test botnet:пролив8 backdoor discovery dropper evasion infostealer loader spyware stealer themida trojan upx vmprotect
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
CryptBot
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
fickerstealer
Malware Config
C2 Extraction:
rdanoriran.xyz:80
qurigoraka.xyz:80
103.246.147.66:38481
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
bukkva.club:80
Unpacked files
SH256 hash:
5d500524991ad1e6178b097b7ee5e270eef3710115b72a424b7fb2643490f992
MD5 hash:
33d711ccfe4a4e9cbd37c99e25c13769
SHA1 hash:
781e0cdc5b1c72f217f54bedd2c2862c73604e89
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments