MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b0e796694c790548cf9553a6ed536b21e8471064c4ae887304137ffcafbe257f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 11


Intelligence 11 IOCs YARA 6 File information Comments

SHA256 hash: b0e796694c790548cf9553a6ed536b21e8471064c4ae887304137ffcafbe257f
SHA3-384 hash: 41550ddbe849d2e7793b471fb15a5812cbbc72ef5105b0cf38c350dbeb6b9b24b1559d96285243d886646e964baace70
SHA1 hash: 10244af805bd9171e533bef5be119b2711660d27
MD5 hash: 3c1e04a4ea4bb3c9466264e0c9419e05
humanhash: spaghetti-hawaii-florida-three
File name:3c1e04a4ea4bb3c9466264e0c9419e05.exe
Download: download sample
Signature CryptBot
File size:655'872 bytes
First seen:2021-03-23 11:08:25 UTC
Last seen:2021-03-23 11:55:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 324f7a23dd9ee2981a38a6a6d641842c (3 x CryptBot, 1 x Smoke Loader, 1 x Loki)
ssdeep 12288:5U34NUIE9870c7p2n5npkb9OeJSzL7RRNrcR1cKyVeccfVgXXToBInHm9cUCv:5ZZP85nSbbSTNrcIKqDcfVWToBInHm9q
Threatray 75 similar samples on MalwareBazaar
TLSH 6FD4121172E0C0BAD61215B64D52CBB14A3AFC711B2697CB7B906B6E2F313C28E76747
Reporter abuse_ch
Tags:CryptBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3c1e04a4ea4bb3c9466264e0c9419e05.exe
Verdict:
Malicious activity
Analysis date:
2021-03-23 11:10:52 UTC
Tags:
stealer trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %temp% directory
Deleting a recently created file
Creating a file
Delayed reading of the file
Reading critical registry keys
Creating a window
DNS request
Sending an HTTP POST request
Sending an HTTP GET request
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Launching a process
Launching cmd.exe command interpreter
Stealing user critical data
Connection attempt to an infection source
Sending an HTTP POST request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot Glupteba
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to register a low level keyboard hook
Delayed program exit found
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Suspicious Svchost Process
Submitted sample is a known malware sample
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Cryptbot
Yara detected Glupteba
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 373891 Sample: L1Zx7vxPkv.exe Startdate: 23/03/2021 Architecture: WINDOWS Score: 100 112 maybo2.hk 2->112 114 iplogger.org 2->114 140 Malicious sample detected (through community Yara rule) 2->140 142 Antivirus detection for URL or domain 2->142 144 Multi AV Scanner detection for dropped file 2->144 146 12 other signatures 2->146 13 L1Zx7vxPkv.exe 50 2->13         started        18 SmartClock.exe 2->18         started        20 svchost.exe 2->20         started        22 SmartClock.exe 2->22         started        signatures3 process4 dnsIp5 126 morqfh02.top 193.38.55.33, 49732, 80 SERVERIUS-ASNL Russian Federation 13->126 128 baatf22.top 35.228.217.164, 49731, 80 GOOGLEUS United States 13->128 130 akqdw02.top 8.209.101.43, 49733, 49734, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 13->130 108 C:\Users\user\AppData\Local\Temp\Lupsi.exe, PE32 13->108 dropped 110 C:\Users\user\AppData\Local\...\lv[1].exe, PE32 13->110 dropped 170 Detected unpacking (overwrites its own PE header) 13->170 172 Tries to harvest and steal browser information (history, passwords, etc) 13->172 24 Lupsi.exe 21 13->24         started        28 cmd.exe 1 13->28         started        file6 signatures7 process8 file9 100 C:\Users\user\AppData\Local\Temp\...\vpn.exe, PE32 24->100 dropped 102 C:\Users\user\AppData\Local\Temp\...\6.exe, PE32 24->102 dropped 104 C:\Users\user\AppData\Local\Temp\...\4.exe, PE32 24->104 dropped 106 2 other files (1 malicious) 24->106 dropped 160 Machine Learning detection for dropped file 24->160 30 vpn.exe 7 24->30         started        32 6.exe 7 24->32         started        35 5.exe 181 24->35         started        39 4.exe 4 24->39         started        162 Submitted sample is a known malware sample 28->162 164 Obfuscated command line found 28->164 166 Uses ping.exe to sleep 28->166 168 Uses ping.exe to check the status of other devices and networks 28->168 41 conhost.exe 28->41         started        43 timeout.exe 1 28->43         started        signatures10 process11 dnsIp12 45 cmd.exe 30->45         started        47 svchost.exe 30->47         started        88 C:\Users\user\AppData\Roaming\...\Tutte.dotx, COM 32->88 dropped 49 cmd.exe 32->49         started        51 svchost.exe 32->51         started        116 googlehosted.l.googleusercontent.com 172.217.168.65, 443, 49737 GOOGLEUS United States 35->116 118 doc-0g-04-docs.googleusercontent.com 35->118 90 C:\Users\user\AppData\...\WinRing0x64.sys, PE32+ 35->90 dropped 92 C:\Users\user\AppData\Local\...\Active.exe, PE32+ 35->92 dropped 94 C:\Users\user\AppData\...\AutoIt3_x64.exe, PE32+ 35->94 dropped 148 Query firmware table information (likely to detect VMs) 35->148 150 Sample is not signed and drops a device driver 35->150 96 C:\Users\user\AppData\...\SmartClock.exe, PE32 39->96 dropped 53 SmartClock.exe 39->53         started        file13 signatures14 process15 process16 55 cmd.exe 45->55         started        58 conhost.exe 45->58         started        60 cmd.exe 49->60         started        62 conhost.exe 49->62         started        signatures17 156 Obfuscated command line found 55->156 158 Uses ping.exe to sleep 55->158 64 Molta.exe.com 55->64         started        67 PING.EXE 55->67         started        70 findstr.exe 55->70         started        73 Taciturna.exe.com 60->73         started        75 findstr.exe 60->75         started        77 PING.EXE 60->77         started        process18 dnsIp19 138 May check the online IP address of the machine 64->138 79 Molta.exe.com 64->79         started        120 127.0.0.1 unknown unknown 67->120 122 192.168.2.1 unknown unknown 67->122 98 C:\Users\user\AppData\...\Molta.exe.com, Targa 70->98 dropped 82 Taciturna.exe.com 73->82         started        file20 signatures21 process22 dnsIp23 132 rhRDHAYtAoQHDCIZfrnmk.rhRDHAYtAoQHDCIZfrnmk 79->132 134 ip-api.com 208.95.112.1, 49741, 80 TUT-ASUS United States 79->134 84 wscript.exe 79->84         started        136 EqzbRWphRAoFVnLs.EqzbRWphRAoFVnLs 82->136 process24 dnsIp25 124 iplogger.org 88.99.66.31, 443, 49742, 49745 HETZNER-ASDE Germany 84->124 152 System process connects to network (likely due to code injection or exploit) 84->152 154 May check the online IP address of the machine 84->154 signatures26
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-03-23 09:15:55 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:cryptbot family:xmrig discovery evasion miner spyware stealer
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Drops startup file
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Blocklisted process makes network request
Executes dropped EXE
Sets file to hidden
XMRig Miner Payload
CryptBot
xmrig
Unpacked files
SH256 hash:
141efaf0bc9b62fc79540f89b03a9f2cc96620accfb7535bee350f1a3667bd02
MD5 hash:
3258156fb979b650ff69c4603670a598
SHA1 hash:
3f0d498788aaadfc77a2a5f0564001d161ff6875
SH256 hash:
b0e796694c790548cf9553a6ed536b21e8471064c4ae887304137ffcafbe257f
MD5 hash:
3c1e04a4ea4bb3c9466264e0c9419e05
SHA1 hash:
10244af805bd9171e533bef5be119b2711660d27
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_CryptBot
Author:ditekSHen
Description:CryptBot/Fugrafa stealer payload
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CryptBot

Executable exe b0e796694c790548cf9553a6ed536b21e8471064c4ae887304137ffcafbe257f

(this sample)

  
Delivery method
Distributed via web download

Comments