MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc53accc69b32c2507210ea70d1d56aa84dbe354a7f79577df180179ea797427. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ApocalypseStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: cc53accc69b32c2507210ea70d1d56aa84dbe354a7f79577df180179ea797427
SHA3-384 hash: f66bc55241dd4843043ece793e70036f6593c9cc9ac14160c7010e259d217a1e5d8bc3d3522cdb31e11684a33fc88e67
SHA1 hash: 8fae8984391bd9dddb7afc0ebdd87a05954a7134
MD5 hash: bd64d2e0d11093bbd84be2b6ca1c113d
humanhash: connecticut-india-harry-magazine
File name:cc53accc69b32c2507210ea70d1d56aa84dbe354a7f79577df180179ea797427
Download: download sample
Signature ApocalypseStealer
File size:6'473'744 bytes
First seen:2021-02-28 07:28:02 UTC
Last seen:2021-02-28 10:08:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a433bcf814979ada832d35d0623c6a1e (1 x ApocalypseStealer, 1 x DCRat)
ssdeep 196608:9LSllO4CkacXgXHMG3y+dqhPO74oID5LUgyl1RSBR/Cg:NSlE4YcXOxyHPO7n+peMDag
Threatray 206 similar samples on MalwareBazaar
TLSH 38663305CBCF4603E8C59AF3B88F591056244366F8BC5FF64513081FBB6DA9BB867268
Reporter JAMESWT_WT
Tags:ApocalypseStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
955
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cc53accc69b32c2507210ea70d1d56aa84dbe354a7f79577df180179ea797427
Verdict:
Malicious activity
Analysis date:
2021-02-28 08:20:41 UTC
Tags:
stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a UDP request
Creating a file
Launching a process
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Running batch commands
Deleting a recently created file
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DCRat StormKitty Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the user root directory
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Yara detected StormKitty Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 359377 Sample: d1VkusfZmE Startdate: 28/02/2021 Architecture: WINDOWS Score: 100 85 kosmetcika.online 212.109.199.100, 80 THEFIRST-ASRU Russian Federation 2->85 87 192.168.2.1 unknown unknown 2->87 107 Found malware configuration 2->107 109 Malicious sample detected (through community Yara rule) 2->109 111 Antivirus detection for dropped file 2->111 113 15 other signatures 2->113 9 d1VkusfZmE.exe 4 2->9         started        13 msiexec.exe 2->13         started        signatures3 process4 file5 61 C:\Users\user\AppData\Local\...\lxxxxxx.exe, PE32 9->61 dropped 63 C:\Users\user\AppData\Local\Temp\File.exe, PE32 9->63 dropped 65 C:\Users\user\AppData\Local\Temp\1.exe, PE32+ 9->65 dropped 127 Query firmware table information (likely to detect VMs) 9->127 129 Tries to detect sandboxes and other dynamic analysis tools (window names) 9->129 131 Hides threads from debuggers 9->131 133 Tries to detect sandboxes / dynamic malware analysis system (registry check) 9->133 15 File.exe 19 9->15         started        19 lxxxxxx.exe 1 11 9->19         started        21 1.exe 4 9->21         started        signatures6 process7 file8 67 C:\Users\user\AppData\...\@asasinalex.exe, PE32 15->67 dropped 69 C:\Users\user\AppData\Roaming\1337\1.exe, PE32+ 15->69 dropped 83 2 other files (1 malicious) 15->83 dropped 95 Multi AV Scanner detection for dropped file 15->95 97 Machine Learning detection for dropped file 15->97 23 @asasinalex.exe 15 35 15->23         started        27 1.exe 15->27         started        71 C:\Windows\appcompat\...\fontdrvhost.exe, PE32 19->71 dropped 73 C:\Users\Default\RuntimeBroker.exe, PE32 19->73 dropped 75 C:\ProgramData\...\smartscreen.exe, PE32 19->75 dropped 77 C:\ProgramData\Package Cache\...\msiexec.exe, PE32 19->77 dropped 99 Antivirus detection for dropped file 19->99 101 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 19->101 103 Drops PE files to the user root directory 19->103 105 2 other signatures 19->105 29 schtasks.exe 19->29         started        31 schtasks.exe 19->31         started        41 2 other processes 19->41 79 C:\ProgramData\...\SecurityHealthTray.exe, PE32+ 21->79 dropped 81 C:\ProgramData\SecurityEssentials\task.xml, XML 21->81 dropped 33 cmd.exe 1 21->33         started        35 cmd.exe 1 21->35         started        37 cmd.exe 1 21->37         started        39 schtasks.exe 1 21->39         started        signatures9 process10 dnsIp11 89 apocalypsee.fun 178.208.83.27, 49703, 80 VDSINA-ASRU Russian Federation 23->89 91 ip-api.com 208.95.112.1, 49702, 80 TUT-ASUS United States 23->91 93 3 other IPs or domains 23->93 115 Detected unpacking (changes PE section rights) 23->115 117 Detected unpacking (overwrites its own PE header) 23->117 119 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 23->119 125 5 other signatures 23->125 121 Antivirus detection for dropped file 27->121 43 conhost.exe 29->43         started        45 conhost.exe 31->45         started        123 Uses cmd line tools excessively to alter registry or file data 33->123 47 conhost.exe 33->47         started        55 3 other processes 33->55 49 conhost.exe 35->49         started        57 3 other processes 35->57 51 conhost.exe 37->51         started        53 conhost.exe 39->53         started        59 2 other processes 41->59 signatures12 process13
Threat name:
Win32.Dropper.Delfea
Status:
Malicious
First seen:
2021-02-26 23:32:20 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig discovery evasion miner spyware themida trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
NSIS installer
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Looks up external IP address via web service
Checks BIOS information in registry
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
themida
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner Payload
xmrig
Unpacked files
SH256 hash:
24b93292dc2cb37fa8b990a0e548fbfe5d2ea88fc3b0228808915f14c5e85e86
MD5 hash:
4447f458a0cf3bedb38f5cf9897c998c
SHA1 hash:
b3975f5bf7273821190e038ef9a11a54c02b5760
SH256 hash:
6eee6ff03c6779f470bd3f0635fb68cb231c5c53a60888a543511d339de70e5b
MD5 hash:
d0e5709a096b1507c4d027c579875384
SHA1 hash:
c011f68b7eeb099f215285eec1bbb016b5611406
SH256 hash:
dbea34702c32688f055d9c56d3267a4d4da98adea992a7df123a2b3e8487018a
MD5 hash:
348865c449962bf4154b89d43640f4bb
SHA1 hash:
2079978d1f4a92402f5359c98b822f6587da9fce
SH256 hash:
f21977ed2d24bfb564462daad503ef5be942bab7533802cf5af39db4c2da1e6d
MD5 hash:
bbf40afd2c834b07bb60944fab83e637
SHA1 hash:
86dda968fcf73c60fccc77b1d46e377bee8b3e18
SH256 hash:
cc53accc69b32c2507210ea70d1d56aa84dbe354a7f79577df180179ea797427
MD5 hash:
bd64d2e0d11093bbd84be2b6ca1c113d
SHA1 hash:
8fae8984391bd9dddb7afc0ebdd87a05954a7134
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments