MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 957860a901820c6cd66f49700a18a4fc3243104f8147805d1bbec9ec651f009b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 8


Intelligence 8 IOCs 2 YARA File information Comments 1

SHA256 hash: 957860a901820c6cd66f49700a18a4fc3243104f8147805d1bbec9ec651f009b
SHA3-384 hash: 32ad2d9d7a9fa287e51d5689ee462953948448818cd185dff071d72cd8a438996e8b6dcbe6dafb775450a4310172b763
SHA1 hash: 36efd5c267c1d05db8e7bc0d62af52233d79f833
MD5 hash: cca94ebe2237705c890dc3035d4ab8ec
humanhash: sink-skylark-double-idaho
File name:cca94ebe_by_Libranalysis
Download: download sample
Signature CryptBot
File size:1'734'531 bytes
First seen:2021-05-24 06:01:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 011a034751880c1944da3b5ecc18520d (8 x RedLineStealer, 4 x CryptBot, 3 x ArkeiStealer)
ssdeep 49152:QmMT8vQb2rDCJub2ON99zkKc3SQf/ntcT1QbQwDWXb:QrWQgDCJ89gKc3SE/C+uXb
Threatray 151 similar samples on MalwareBazaar
TLSH 1D853313B4E0807BDBD1297198ACA6288069E1261726D6DB63C12E4BFD757C2FB353C6
Reporter Libranalysis
Tags:CryptBot


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://moreru07.top/index.php https://threatfox.abuse.ch/ioc/57588/
http://sogqfs71.top/index.php https://threatfox.abuse.ch/ioc/58064/

Intelligence


File Origin
# of uploads :
1
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cca94ebe_by_Libranalysis
Verdict:
Malicious activity
Analysis date:
2021-05-24 06:03:36 UTC
Tags:
stealer trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Deleting a recently created file
DNS request
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
84 / 100
Signature
Contains functionality to register a low level keyboard hook
Found many strings related to Crypto-Wallets (likely being stolen)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Cryptbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 422427 Sample: cca94ebe_by_Libranalysis Startdate: 24/05/2021 Architecture: WINDOWS Score: 84 36 Malicious sample detected (through community Yara rule) 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 Yara detected Cryptbot 2->40 42 Found many strings related to Crypto-Wallets (likely being stolen) 2->42 9 cca94ebe_by_Libranalysis.exe 7 2->9         started        process3 signatures4 44 Contains functionality to register a low level keyboard hook 9->44 12 cmd.exe 1 9->12         started        process5 signatures6 46 Submitted sample is a known malware sample 12->46 48 Obfuscated command line found 12->48 50 Uses ping.exe to sleep 12->50 52 Uses ping.exe to check the status of other devices and networks 12->52 15 cmd.exe 3 12->15         started        18 conhost.exe 12->18         started        process7 signatures8 54 Obfuscated command line found 15->54 56 Uses ping.exe to sleep 15->56 20 PING.EXE 1 15->20         started        23 Gote.exe.com 15->23         started        25 findstr.exe 1 15->25         started        process9 dnsIp10 30 127.0.0.1 unknown unknown 20->30 32 192.168.2.1 unknown unknown 20->32 27 Gote.exe.com 23->27         started        process11 dnsIp12 34 WlGPggxUdISCOGUFEhGThXe.WlGPggxUdISCOGUFEhGThXe 27->34
Threat name:
Win32.Backdoor.Generic
Status:
Suspicious
First seen:
2021-05-23 23:11:59 UTC
AV detection:
3 of 28 (10.71%)
Threat level:
  5/5
Result
Malware family:
cryptbot
Score:
  10/10
Tags:
family:cryptbot discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
CryptBot
Suspicious use of NtCreateProcessExOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-24 07:43:56 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0009] Anti-Behavioral Analysis::Virtual Machine Detection
1) [F0002.001] Collection::Application Hook
2) [F0002.002] Collection::Polling
3) [C0029.003] Cryptography Micro-objective::SHA256::Cryptographic Hash
4) [C0032.001] Data Micro-objective::CRC32::Checksum
5) [C0026.002] Data Micro-objective::XOR::Encode Data
7) [C0046] File System Micro-objective::Create Directory
8) [C0048] File System Micro-objective::Delete Directory
9) [C0047] File System Micro-objective::Delete File
10) [C0049] File System Micro-objective::Get File Attributes
11) [C0051] File System Micro-objective::Read File
12) [C0050] File System Micro-objective::Set File Attributes
13) [C0052] File System Micro-objective::Writes File
14) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
15) [C0017] Process Micro-objective::Create Process
16) [C0038] Process Micro-objective::Create Thread
17) [C0054] Process Micro-objective::Resume Thread
18) [C0018] Process Micro-objective::Terminate Process