MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a21cd46fbedb13199e3675a4ee14af9914547d237342fca0c8cd8022a7888363. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BlankGrabber


Vendor detections: 11


Intelligence 11 IOCs YARA 7 File information Comments

SHA256 hash: a21cd46fbedb13199e3675a4ee14af9914547d237342fca0c8cd8022a7888363
SHA3-384 hash: 58ea796a338fd7eb9bcf32cbad33a2a07f39df6d195abfe124ff88d14d90c5333ee8366f8122446c60eb0256d7f0d6f7
SHA1 hash: 20eae332be7470533009e2a0f28412463acb1f06
MD5 hash: 3ac5f99224a92851c80fe4178fff6002
humanhash: jig-quebec-kitten-item
File name:Жаркова .exe
Download: download sample
Signature BlankGrabber
File size:24'810'296 bytes
First seen:2024-11-10 16:00:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e8a30656287fe831c9782204ed10cd68 (7 x LummaStealer, 3 x RedLineStealer, 2 x DCRat)
ssdeep 393216:oAZ/msYXMrZme4GaBWbBFcCdq1auXYKKJo1/uG8IQKqSgjqgeMW5+74:oAZ/mlXKZmWaYFqoBo1uG8N/jReMD4
TLSH T128473348EB9508EDC2BBD5349DC71712E6767C161731DA6B62E903262E6F2B0CC7A313
TrID 48.7% (.EXE) Win64 Executable (generic) (10522/11/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter aachum
Tags:BlankGrabber CrealStealer exe sfx


Avatar
iamaachum
https://wdfiles.ru/29qct

Intelligence


File Origin
# of uploads :
1
# of downloads :
377
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Жаркова .exe
Verdict:
Malicious activity
Analysis date:
2024-11-10 16:25:41 UTC
Tags:
evasion phishing discord blankgrabber stealer pyinstaller susp-powershell

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
autorun gumen
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
DNS request
Launching a process
Using the Windows Management Instrumentation requests
Connection attempt
Sending an HTTP GET request
Delayed reading of the file
Sending a custom TCP request
Reading critical registry keys
Enabling the 'hidden' option for recently created files
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Result
Threat name:
Blank Grabber, Creal Stealer
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Check if machine is in data center or colocation facility
Drops PE files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Modifies Windows Defender protection settings
Multi AV Scanner detection for submitted file
Removes signatures from Windows Defender
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal communication platform credentials (via file / registry access)
Tries to steal Crypto Currency Wallets
Yara detected Blank Grabber
Yara detected Creal Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1553259 Sample: #U0416#U0430#U0440#U043a#U0... Startdate: 10/11/2024 Architecture: WINDOWS Score: 100 100 geolocation-db.com 2->100 102 blank-v1rwt.in 2->102 104 4 other IPs or domains 2->104 140 Found malware configuration 2->140 142 Multi AV Scanner detection for submitted file 2->142 144 Yara detected Creal Stealer 2->144 148 5 other signatures 2->148 11 #U0416#U0430#U0440#U043a#U043e#U0432#U0430 .exe 7 2->11         started        14 Creal.exe 2->14         started        signatures3 146 Tries to detect the country of the analysis system (by using the IP) 100->146 process4 file5 86 C:\Users\user\Desktop\Creal.exe, PE32+ 11->86 dropped 88 C:\Users\user\Desktop\Built.exe, PE32+ 11->88 dropped 16 Built.exe 22 11->16         started        20 Creal.exe 115 11->20         started        90 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 14->90 dropped 92 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 14->92 dropped 94 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 14->94 dropped 96 66 other files (none is malicious) 14->96 dropped 22 Creal.exe 14->22         started        process6 file7 70 C:\Users\user\AppData\Local\...\rarreg.key, ASCII 16->70 dropped 72 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 16->72 dropped 74 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 16->74 dropped 82 16 other files (none is malicious) 16->82 dropped 120 Modifies Windows Defender protection settings 16->120 122 Adds a directory exclusion to Windows Defender 16->122 124 Removes signatures from Windows Defender 16->124 24 Built.exe 16->24         started        76 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 20->76 dropped 78 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 20->78 dropped 80 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 20->80 dropped 84 66 other files (none is malicious) 20->84 dropped 126 Drops PE files to the startup folder 20->126 28 Creal.exe 7 20->28         started        128 Tries to harvest and steal browser information (history, passwords, etc) 22->128 130 Tries to steal communication platform credentials (via file / registry access) 22->130 132 Tries to steal Crypto Currency Wallets 22->132 31 cmd.exe 22->31         started        signatures8 process9 dnsIp10 106 ip-api.com 208.95.112.1, 49700, 80 TUT-ASUS United States 24->106 150 Found many strings related to Crypto-Wallets (likely being stolen) 24->150 152 Modifies Windows Defender protection settings 24->152 154 Adds a directory exclusion to Windows Defender 24->154 156 Removes signatures from Windows Defender 24->156 33 cmd.exe 1 24->33         started        36 cmd.exe 1 24->36         started        38 cmd.exe 24->38         started        40 cmd.exe 24->40         started        108 geolocation-db.com 159.89.102.253, 443, 49713, 49719 DIGITALOCEAN-ASNUS United States 28->108 110 api.ipify.org 104.26.12.205, 443, 49706, 49714 CLOUDFLARENETUS United States 28->110 112 api.gofile.io 45.112.123.126, 443, 49707, 49812 AMAZON-02US Singapore 28->112 98 C:\Users\user\AppData\Roaming\...\Creal.exe, PE32+ 28->98 dropped 158 Tries to steal communication platform credentials (via file / registry access) 28->158 160 Tries to steal Crypto Currency Wallets 28->160 42 cmd.exe 28->42         started        44 conhost.exe 31->44         started        46 curl.exe 31->46         started        file11 signatures12 process13 signatures14 134 Modifies Windows Defender protection settings 33->134 136 Adds a directory exclusion to Windows Defender 33->136 138 Removes signatures from Windows Defender 33->138 48 powershell.exe 23 33->48         started        51 conhost.exe 33->51         started        53 powershell.exe 36->53         started        55 conhost.exe 36->55         started        57 MpCmdRun.exe 36->57         started        64 2 other processes 38->64 66 2 other processes 40->66 59 curl.exe 42->59         started        62 conhost.exe 42->62         started        process15 dnsIp16 118 Loading BitLocker PowerShell Module 53->118 68 WmiPrvSE.exe 53->68         started        114 ifconfig.me 34.160.111.145, 49703, 49794, 80 ATGS-MMD-ASUS United States 59->114 116 127.0.0.1 unknown unknown 59->116 signatures17 process18
Gathering data
Threat name:
Win64.Trojan.ReverseShell
Status:
Malicious
First seen:
2024-11-10 16:01:07 UTC
File Type:
PE+ (Exe)
Extracted files:
1702
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
credential_access discovery execution pyinstaller spyware stealer upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Enumerates physical storage devices
Enumerates processes with tasklist
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Command and Scripting Interpreter: PowerShell
Verdict:
Malicious
Tags:
Win.Packed.Bladabindi-10017056-0
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BlankGrabber

Executable exe a21cd46fbedb13199e3675a4ee14af9914547d237342fca0c8cd8022a7888363

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments