MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 db460c5aa2fac933fb349df4a547a31a78b5d5e39f0df6bca9746a50c45ad309. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptOne


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: db460c5aa2fac933fb349df4a547a31a78b5d5e39f0df6bca9746a50c45ad309
SHA3-384 hash: 25b2be66e115b9de15439f3654ef81488d0354d126b9f1ae95bf15653c01d451d9a36ab92f90a3f53c14bc459114fb72
SHA1 hash: b3a4aa038b46bf362e955d30662ebb865db88c59
MD5 hash: b6a808a720e5a620d84374de290a5cbe
humanhash: jersey-yellow-cat-oklahoma
File name:b6a808a720e5a620d84374de290a5cbe.exe
Download: download sample
Signature CryptOne
File size:1'762'138 bytes
First seen:2023-07-02 06:03:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0e806fd55a4f41060c8e206a25d6875a (10 x CryptOne)
ssdeep 49152:OCWhF7BfJXAEsN6ooNxe5+oHEjSUSM8ALlKF:OCWhF7BfKEvxK9HRXnF
Threatray 523 similar samples on MalwareBazaar
TLSH T18B852202BBC181B2C6661A324F75A731A57EF8305F54DACFD3A459ACE9305C09B393A7
TrID 88.3% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
4.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.0% (.EXE) Win32 Executable (generic) (4505/5/1)
0.9% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon b3b3b371716b93b3 (25 x CryptOne, 12 x RemcosRAT, 6 x RedLineStealer)
Reporter abuse_ch
Tags:CryptOne exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
270
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Launching a process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm crypto fauppod greyware lolbin msiexec msiexec overlay packed replace setupapi shdocvw shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Yara detected CryptOne packer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fauppod
Status:
Malicious
First seen:
2023-07-02 06:04:08 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Loads dropped DLL
Unpacked files
SH256 hash:
c7fcf73951120f2826fea93a37b20a9102366258af37491cf5ba65e82f6ac022
MD5 hash:
83f6e08d9716a1c5e122bf4e50b278dd
SHA1 hash:
211b46518a1227d6960de8e05d361d5e6ee6e2e1
SH256 hash:
db460c5aa2fac933fb349df4a547a31a78b5d5e39f0df6bca9746a50c45ad309
MD5 hash:
b6a808a720e5a620d84374de290a5cbe
SHA1 hash:
b3a4aa038b46bf362e955d30662ebb865db88c59
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments