MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c3b699aaaf2a476cf84ca13efd09ac86e66b501e3baaa5b0ef7cdabc47ee9ec1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c3b699aaaf2a476cf84ca13efd09ac86e66b501e3baaa5b0ef7cdabc47ee9ec1
SHA3-384 hash: 232a6e9786f9f67cb2e61d287b1bb3b23941a9e5017f637033116e63f29f81ff45e36b8d53893848eebb2535e3ff9b16
SHA1 hash: 8690249cb2040c7d32e09d8b84c888f0fd0c736f
MD5 hash: 603afc39509ea12acf6ef69b94af3fad
humanhash: uranus-william-five-alaska
File name:603afc39509ea12acf6ef69b94af3fad.exe
Download: download sample
File size:1'198'682 bytes
First seen:2021-03-16 19:31:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a1a66d588dcf1394354ebf6ec400c223 (49 x RedLineStealer, 7 x CryptBot, 4 x AZORult)
ssdeep 24576:a53uhFQfcc0Hsmj2yrU1CcpltZN2P8RUX9FqevjsnKzRz:a5+hFOccWyyrqC8ZNxajJzRz
Threatray 56 similar samples on MalwareBazaar
TLSH AC452321B5DAA1FAD5B236704909BB2668F2F3301B1D41C3B7510613AE7EEE4D77D08A
Reporter abuse_ch
Tags:exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
603afc39509ea12acf6ef69b94af3fad.exe
Verdict:
Malicious activity
Analysis date:
2021-03-16 19:34:39 UTC
Tags:
evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Sending a UDP request
Creating a process from a recently created file
Deleting a recently created file
DNS request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot
Detection:
malicious
Classification:
troj.spyw.evad
Score:
72 / 100
Signature
Contains functionality to register a low level keyboard hook
Multi AV Scanner detection for submitted file
Obfuscated command line found
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Cryptbot
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 369654 Sample: nt18gUFXxy.exe Startdate: 16/03/2021 Architecture: WINDOWS Score: 72 40 Multi AV Scanner detection for submitted file 2->40 42 Yara detected Cryptbot 2->42 9 nt18gUFXxy.exe 8 2->9         started        process3 signatures4 48 Contains functionality to register a low level keyboard hook 9->48 12 cmd.exe 1 9->12         started        15 cmd.exe 1 9->15         started        process5 signatures6 50 Submitted sample is a known malware sample 12->50 52 Obfuscated command line found 12->52 54 Uses ping.exe to sleep 12->54 56 Uses ping.exe to check the status of other devices and networks 12->56 17 conhost.exe 12->17         started        19 cmd.exe 3 15->19         started        22 conhost.exe 15->22         started        process7 signatures8 44 Obfuscated command line found 19->44 46 Uses ping.exe to sleep 19->46 24 PING.EXE 1 19->24         started        27 Volevo.exe.com 19->27         started        29 findstr.exe 1 19->29         started        process9 dnsIp10 34 127.0.0.1 unknown unknown 24->34 31 Volevo.exe.com 3 27->31         started        process11 dnsIp12 36 192.168.2.1 unknown unknown 31->36 38 NWIjtSVRUQVqLfTXzofok.NWIjtSVRUQVqLfTXzofok 31->38
Threat name:
Win32.PUA.7zip
Status:
Malicious
First seen:
2021-03-16 05:49:50 UTC
AV detection:
12 of 28 (42.86%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer
Behaviour
Delays execution with timeout.exe
Runs ping.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
8419d335d27fc143453883a81f097564bde0c88d1be20ab0dc043bc3e444bf5e
MD5 hash:
dd3fd5ac5d0da7050976fcb778a58ea5
SHA1 hash:
22fca44fc2e3b123c6c651301fb4a3ba6e16a2b7
SH256 hash:
c3b699aaaf2a476cf84ca13efd09ac86e66b501e3baaa5b0ef7cdabc47ee9ec1
MD5 hash:
603afc39509ea12acf6ef69b94af3fad
SHA1 hash:
8690249cb2040c7d32e09d8b84c888f0fd0c736f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Executable exe c3b699aaaf2a476cf84ca13efd09ac86e66b501e3baaa5b0ef7cdabc47ee9ec1

(this sample)

  
Delivery method
Distributed via web download

Comments