MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 63d9527d69c228772ebadb63c1e74d7d0702acac52357fcea08ec5a408ca0453. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 10


Intelligence 10 IOCs 2 YARA 10 File information Comments

SHA256 hash: 63d9527d69c228772ebadb63c1e74d7d0702acac52357fcea08ec5a408ca0453
SHA3-384 hash: 1797721c440da480e406085f38fa456ace7bd436b2a0c77f1caece2629fcd8e69eb9cb152d04b9346cdd0dad1efc990c
SHA1 hash: 7520881fb2f612379efa29f2a062e43c184944dd
MD5 hash: e8dea23ae7ad4a458af6b36a0fa5d77f
humanhash: idaho-edward-stairway-ten
File name:E8DEA23AE7AD4A458AF6B36A0FA5D77F.exe
Download: download sample
Signature CryptBot
File size:383'488 bytes
First seen:2021-06-18 12:50:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a98ef36ca5b4cb4252d443cc4e9bbbbd (1 x CryptBot)
ssdeep 6144:zYJVHSd9LiK2KWz6OjhGsYDz2HQruFlwe7FEiGveq/kzC/:zYJVyDLiK2UOjpYc6uFlw8OZv5kz
Threatray 590 similar samples on MalwareBazaar
TLSH 6584AF10E7A0C0B4F1F712B84ABA9FB995ED79A1672490CF53D52AEA57342E0EC31707
Reporter abuse_ch
Tags:CryptBot exe


Avatar
abuse_ch
CryptBot C2:
http://kiydbi52.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://kiydbi52.top/index.php https://threatfox.abuse.ch/ioc/136298/
http://morunx05.top/index.php https://threatfox.abuse.ch/ioc/136300/

Intelligence


File Origin
# of uploads :
1
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
E8DEA23AE7AD4A458AF6B36A0FA5D77F.exe
Verdict:
Malicious activity
Analysis date:
2021-06-18 12:51:27 UTC
Tags:
trojan loader rat redline evasion stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Cryptbot RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample or dropped binary is a compiled AutoHotkey binary
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected Cryptbot
Yara detected Evader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 436739 Sample: 6izJE3lyz1.exe Startdate: 18/06/2021 Architecture: WINDOWS Score: 100 57 morunx05.top 2->57 59 kiydbi52.top 2->59 61 2 other IPs or domains 2->61 83 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->83 85 Found malware configuration 2->85 87 Malicious sample detected (through community Yara rule) 2->87 89 14 other signatures 2->89 9 6izJE3lyz1.exe 36 2->9         started        signatures3 process4 dnsIp5 73 g-partners.in 8.209.115.89, 49721, 49722, 49723 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 9->73 75 iplogger.org 88.99.66.31, 443, 49743, 49744 HETZNER-ASDE Germany 9->75 77 4 other IPs or domains 9->77 49 C:\Users\user\AppData\...\17336128535.exe, PE32 9->49 dropped 51 C:\Users\user\AppData\...\02965990060.exe, PE32 9->51 dropped 53 C:\Users\user\AppData\...\01756130426.exe, PE32 9->53 dropped 55 10 other files (5 malicious) 9->55 dropped 107 Detected unpacking (changes PE section rights) 9->107 109 Detected unpacking (overwrites its own PE header) 9->109 111 May check the online IP address of the machine 9->111 14 cmd.exe 1 9->14         started        16 cmd.exe 1 9->16         started        18 cmd.exe 1 9->18         started        20 2 other processes 9->20 file6 signatures7 process8 process9 22 02965990060.exe 8 14->22         started        27 conhost.exe 14->27         started        29 17336128535.exe 15 25 16->29         started        31 conhost.exe 16->31         started        33 01756130426.exe 30 18->33         started        35 conhost.exe 18->35         started        37 Garbage Cleaner.exe 20->37         started        39 conhost.exe 20->39         started        41 2 other processes 20->41 dnsIp10 63 nailedpizza.top 22->63 65 iplogger.org 22->65 47 C:\Users\user\AppData\...\edspolishpp.exe, PE32 22->47 dropped 91 Detected unpacking (changes PE section rights) 22->91 93 Detected unpacking (overwrites its own PE header) 22->93 95 May check the online IP address of the machine 22->95 105 2 other signatures 22->105 43 edspolishpp.exe 22->43         started        67 185.215.113.64, 49749, 49754, 49755 WHOLESALECONNECTIONSNL Portugal 29->67 69 api.ip.sb 29->69 97 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 29->97 99 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 29->99 101 Tries to steal Crypto Currency Wallets 29->101 103 Tries to harvest and steal browser information (history, passwords, etc) 33->103 71 iplogger.org 37->71 file11 signatures12 process13 dnsIp14 79 185.215.113.17, 18597, 49757, 49761 WHOLESALECONNECTIONSNL Portugal 43->79 81 api.ip.sb 43->81 113 Detected unpacking (changes PE section rights) 43->113 115 Detected unpacking (overwrites its own PE header) 43->115 117 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 43->117 119 3 other signatures 43->119 signatures15
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-06-15 08:38:40 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:cryptbot family:redline family:vidar discovery infostealer spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Deletes itself
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
CryptBot
CryptBot Payload
RedLine
RedLine Payload
Vidar
Malware Config
C2 Extraction:
kiydbi52.top
morunx05.top
Unpacked files
SH256 hash:
e4f608a0e2d25ed37aa303e69c3b39236c0280914c9bf21933fc60a618fddc50
MD5 hash:
6aca72ccc351bd2719694abe3c66883f
SHA1 hash:
ae3ebd16f20d9b3753690b8901a277415d4a7146
SH256 hash:
63d9527d69c228772ebadb63c1e74d7d0702acac52357fcea08ec5a408ca0453
MD5 hash:
e8dea23ae7ad4a458af6b36a0fa5d77f
SHA1 hash:
7520881fb2f612379efa29f2a062e43c184944dd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_CryptBot
Author:ditekSHen
Description:CryptBot/Fugrafa stealer payload
Rule name:MALWARE_Win_Ficker
Author:ditekSHen
Description:Detects Ficker infostealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments