MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dab1bc725537fd108f5bfab274982773c68e9ef8d14d3412495cbcfdf1f04f70. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



EpsilonStealer


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: dab1bc725537fd108f5bfab274982773c68e9ef8d14d3412495cbcfdf1f04f70
SHA3-384 hash: a7f50121ec384f0c2c1299bf996a95bd391080b01b2a159ac992a8c080f2c52f993b71e75092a81545d8e1965ed560ec
SHA1 hash: 0af9b23e1b3667d5f14403ec82ce2901ede6ff29
MD5 hash: 3133c80e73257392bf2a48532b334930
humanhash: colorado-ceiling-mountain-jig
File name:PlanetsBeta.exe
Download: download sample
Signature EpsilonStealer
File size:74'823'917 bytes
First seen:2024-01-17 13:46:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (527 x GuLoader, 110 x RemcosRAT, 80 x EpsilonStealer)
ssdeep 1572864:w4/4rzOchPc4HXwwCpbfJdHYil6/MsLsBSEJ/10MwKztSWVkTl287:jkqcdhHnC5Rei/sLsBd/VwR/Y87
TLSH T18FF73358ADCB34F7C03435F2B2F5655A340746035EF8E79198DA3A6EE06500AACF97B2
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 98e5676565a5a198 (20 x EpsilonStealer, 2 x NovaSentinel, 1 x LummaStealer)
Reporter beansoup
Tags:discord electron EpsilonStealer exe PlanetsTherapy

Intelligence


File Origin
# of uploads :
1
# of downloads :
446
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control installer lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
suspicious
Classification:
adwa
Score:
28 / 100
Signature
Drops PE files to the startup folder
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1376048 Sample: PlanetsBeta.exe Startdate: 17/01/2024 Architecture: WINDOWS Score: 28 64 www.google.com 2->64 66 www.facebook.com 2->66 68 8 other IPs or domains 2->68 9 PlanetsBeta.exe 182 2->9         started        process3 file4 48 C:\Users\user\AppData\...\PlanetsBeta.exe, PE32+ 9->48 dropped 50 C:\Users\user\AppData\Local\...\nsis7z.dll, PE32 9->50 dropped 52 C:\Users\user\AppData\Local\...\System.dll, PE32 9->52 dropped 54 14 other files (none is malicious) 9->54 dropped 12 PlanetsBeta.exe 6 9->12         started        process5 dnsIp6 72 api.gofile.io 151.80.29.83, 443, 49747, 49752 OVHFR Italy 12->72 74 www.google.com 142.251.40.132, 49739, 49740, 49760 GOOGLEUS United States 12->74 76 6 other IPs or domains 12->76 56 C:\Users\user\AppData\...\PlanetsBeta.exe, PE32 12->56 dropped 58 C:\Users\user\AppData\...\PlanetsBeta.exe, PE32 12->58 dropped 60 C:\Users\user\AppData\...\PlanetsBeta.exe, PE32 12->60 dropped 62 3 other files (none is malicious) 12->62 dropped 78 Drops PE files to the startup folder 12->78 17 cmd.exe 12->17         started        19 cmd.exe 1 12->19         started        21 cmd.exe 1 12->21         started        23 37 other processes 12->23 file7 signatures8 process9 dnsIp10 26 conhost.exe 17->26         started        28 tasklist.exe 17->28         started        30 WMIC.exe 1 19->30         started        32 conhost.exe 19->32         started        34 tasklist.exe 1 21->34         started        36 conhost.exe 21->36         started        70 chrome.cloudflare-dns.com 162.159.61.3, 443, 49742, 49763 CLOUDFLARENETUS United States 23->70 38 conhost.exe 23->38         started        40 tasklist.exe 1 23->40         started        42 59 other processes 23->42 process11 process12 44 Conhost.exe 26->44         started        46 Conhost.exe 38->46         started       
Gathering data
Verdict:
unknown
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence spyware stealer
Behaviour
Creates scheduled task(s)
Detects videocard installed
Enumerates processes with tasklist
Runs net.exe
Suspicious use of AdjustPrivilegeToken
Views/modifies file attributes
Enumerates physical storage devices
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

EpsilonStealer

Executable exe dab1bc725537fd108f5bfab274982773c68e9ef8d14d3412495cbcfdf1f04f70

(this sample)

Comments