MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c2d271ae60ecbc83b9b6cab66efba2bd69e60efb78ec3661bd92974c1569902b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BlankGrabber


Vendor detections: 9


Intelligence 9 IOCs YARA 8 File information Comments

SHA256 hash: c2d271ae60ecbc83b9b6cab66efba2bd69e60efb78ec3661bd92974c1569902b
SHA3-384 hash: 869883adde780e5a06110b6d9ae07d438a03ca2544588ac1c8db7e3ad14cf4416fbed90cd679b8b27f100bda6f75dd0a
SHA1 hash: be328e0c686643762f5fc2a3e4380e7407723d6c
MD5 hash: 3be225583d6f3a6de5e84d54873001ee
humanhash: london-wolfram-river-diet
File name:file
Download: download sample
Signature BlankGrabber
File size:34'247'880 bytes
First seen:2026-05-04 14:43:46 UTC
Last seen:2026-05-04 18:58:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ad510aa4318530074af11ba8249f6938 (4 x BlankGrabber)
ssdeep 393216:0+apOK1SlHY5cDi2nXvqFK6YGdfdZLfsXKQcNEgyRWmpHtoRFjXXDoIxuXOboey2:5acK4hacDi2niXzsJ8EgovW7jXDvoL+z
TLSH T1A6773352F19B56FDFC13AC7858560647227AF8202F23E2E7179902D0ED575EE2B32E09
TrID 37.0% (.EXE) Win64 Executable (generic) (6522/11/2)
28.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
11.3% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
dhash icon f0f0e2ece8e0f050 (2 x BlankGrabber)
Reporter Bitsight
Tags:a BlankGrabber dropped-by-gcleaner exe MIX5.file signed

Code Signing Certificate

Organisation:Microsoft Corporation
Issuer:Microsoft Corporation
Algorithm:sha256WithRSAEncryption
Valid from:2026-05-04T12:01:15Z
Valid to:2029-05-04T12:11:15Z
Serial number: 141548eecaf2c0b94d1eb49009cfd5d5
Thumbprint Algorithm:SHA256
Thumbprint: 81db793a735ceda9e9090a3d916cde3f19429edbb856eb82f55b3f8245513680
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
Bitsight
url: http://158.94.209.95/service

Intelligence


File Origin
# of uploads :
3
# of downloads :
130
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Malware family:
n/a
ID:
1
File name:
exe
Verdict:
No threats detected
Analysis date:
2026-05-04 14:45:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Creating a process from a recently created file
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Connection attempt
Sending an HTTP POST request
DNS request
Sending an HTTP GET request
Creating a file in the %temp% directory
Launching a process
Сreating synchronization primitives
Searching for synchronization primitives
Modifying a system file
Launching a tool to kill processes
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
expand lolbin microsoft_visual_cc signed
Verdict:
Malicious
File Type:
exe x64
First seen:
2026-05-04T12:02:00Z UTC
Last seen:
2026-05-04T14:14:00Z UTC
Hits:
~100
Detections:
Trojan-PSW.Win32.Greedy.sb Trojan-PSW.MSIL.Stealer.sb HackTool.Win64.BroHack.hn HackTool.Win64.BroHack.sb BSS:HackTool.Win32.Yzon.a Trojan-PSW.Win32.Disco.sb Trojan-PSW.Win32.Coins.sb HEUR:Trojan-PSW.Win32.Disco.gen VHO:Trojan.Win64.Convagent.gen BSS:Trojan.Win32.Generic Trojan.MSIL.Kazuar.cc Trojan.MSIL.Kazuar.sb
Gathering data
Threat name:
Win64.Trojan.Giant
Status:
Malicious
First seen:
2026-05-04 14:44:40 UTC
File Type:
PE+ (Exe)
Extracted files:
3
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
blankgrabber
Score:
  10/10
Tags:
family:blankgrabber credential_access defense_evasion discovery execution persistence privilege_escalation ransomware spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies registry key
Runs net.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy service COM API
Browser Information Discovery
Event Triggered Execution: Netsh Helper DLL
Permission Groups Discovery: Local Groups
System Network Configuration Discovery: Wi-Fi Discovery
System Time Discovery
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Checks system information in the registry
Enumerates processes with tasklist
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Credentials from Password Stores: Windows Credential Manager
Deletes itself
Executes dropped EXE
Loads dropped DLL
Modifies visibility of existing users in the login screen
Reads data files stored by FTP clients
Reads local data of messenger clients
Reads ssh keys stored on the system
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Stops running service(s)
Unsecured Credentials: Credentials In Files
Command and Scripting Interpreter: PowerShell
Looks for VMWare Tools registry key
Looks for VMWare drivers on disk
Looks for VMWare services registry key.
Looks for Xen service registry key.
Modifies Windows Firewall
Uses browser remote debugging
Enumerates VirtualBox registry keys
Grants admin privileges
Looks for VirtualBox Guest Additions in registry
Looks for VirtualBox drivers on disk
A stealer written in Python and packaged with Pyinstaller
Family: blankgrabber
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BlankGrabber

Executable exe c2d271ae60ecbc83b9b6cab66efba2bd69e60efb78ec3661bd92974c1569902b

(this sample)

  
Dropped by
Gcleaner
  
Delivery method
Distributed via web download

Comments