MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc23f531b2e23535601968a1453a45565c9214264d4ef3d016c0a983ed720c30. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BlankGrabber


Vendor detections: 16


Intelligence 16 IOCs YARA 4 File information Comments

SHA256 hash: dc23f531b2e23535601968a1453a45565c9214264d4ef3d016c0a983ed720c30
SHA3-384 hash: d4bd9a4516e4b42e65adab8a7c36f1c3c7097ccbdaf79ab0cf338d2758fafa3e94afae9b91f7a0880682afd3204c68c3
SHA1 hash: a3ad8109c208b12d35359e78f4ebc23ed79ccf24
MD5 hash: 7d207c243b33d6f3d78acadffd95ae0e
humanhash: johnny-tennis-tennis-hotel
File name:EternalPredictor.exe
Download: download sample
Signature BlankGrabber
File size:18'412'032 bytes
First seen:2024-11-17 10:19:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'749 x AgentTesla, 19'653 x Formbook, 12'246 x SnakeKeylogger)
ssdeep 393216:U8o6tLbdhAQdfxvzbjv1sIUO82oi61Mlk+kv4af0ADcOeIsP:UsbPJpvpn82oi6ulkPLf0WcOeR
TLSH T13307121F61DC1798E4FA8A7555533E3C1E6499FA31EB68BC1A4210CCB07F78C2F8A499
TrID 75.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.9% (.EXE) Win64 Executable (generic) (10522/11/4)
4.6% (.EXE) Win32 Executable (generic) (4504/4/1)
2.1% (.ICL) Windows Icons Library (generic) (2059/9)
2.1% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter aachum
Tags:BlankGrabber exe xworm


Avatar
iamaachum
https://github.com/yoyo-coder/Eternal-Predictor-Free-Stake-Predictor-2024-

XWorm C2: 147.185.221.23:33942
Skuld C2: https://discord.com/api/webhooks/1298867906041479188/X0YmXSYYuFGsCIlZL1CQlv_GeIoIWc3S1cksX7_7_e4Onj-TjaVqNzNpf_yEZ3AJvNBM

Intelligence


File Origin
# of uploads :
1
# of downloads :
426
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
EternalPredictor.exe
Verdict:
Malicious activity
Analysis date:
2024-11-17 10:16:11 UTC
Tags:
evasion uac xworm discord arch-doc remote stealer python screenshot blankgrabber pyinstaller crypto-regex discordgrabber generic golang ims-api susp-powershell skuld ip-check

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun gumen apost
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a file
Creating a file in the %temp% subdirectories
Launching a process
Creating a process with a hidden window
Enabling the 'hidden' option for recently created files
Creating a file in the %AppData% subdirectories
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Running batch commands
Sending an HTTP GET request
Reading critical registry keys
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Launching the process to change network settings
Forced system process termination
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a global event handler for the keyboard
Stealing user critical data
Enabling autorun by creating a file
Adding an exclusion to Microsoft Defender
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Threat name:
Blank Grabber, Skuld Stealer, XWorm
Detection:
malicious
Classification:
rans.troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Creates multiple autostart registry keys
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Installs new ROOT certificates
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Modifies the hosts file
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Sample uses string decryption to hide its real strings
Sigma detected: Bypass UAC via Fodhelper.exe
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Startup Folder Persistence
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes or reads registry keys via WMI
Writes to foreign memory regions
Yara detected Blank Grabber
Yara detected Skuld Stealer
Yara detected Telegram RAT
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1557106 Sample: EternalPredictor.exe Startdate: 17/11/2024 Architecture: WINDOWS Score: 100 117 ip-api.com 2->117 119 api.ipify.org 2->119 121 discord.com 2->121 131 Suricata IDS alerts for network traffic 2->131 133 Found malware configuration 2->133 135 Malicious sample detected (through community Yara rule) 2->135 137 22 other signatures 2->137 12 EternalPredictor.exe 5 2->12         started        15 SecurityHealthSystray.exe 2->15         started        18 XClient.exe 2->18         started        20 XClient.exe 2->20         started        signatures3 process4 file5 109 C:\Users\user\AppData\Roaming\skuld.exe, PE32+ 12->109 dropped 111 C:\Users\user\AppData\Roaming\program.exe, PE32+ 12->111 dropped 113 C:\Users\user\AppData\Roaming\eternal.exe, PE32 12->113 dropped 115 C:\Users\user\...ternalPredictor.exe.log, CSV 12->115 dropped 22 program.exe 22 12->22         started        26 skuld.exe 2 2 12->26         started        29 eternal.exe 1 6 12->29         started        191 Multi AV Scanner detection for dropped file 15->191 193 UAC bypass detected (Fodhelper) 15->193 31 cmd.exe 15->31         started        33 conhost.exe 15->33         started        signatures6 process7 dnsIp8 95 C:\Users\user\AppData\Local\...\rarreg.key, ASCII 22->95 dropped 97 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 22->97 dropped 99 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 22->99 dropped 105 16 other files (none is malicious) 22->105 dropped 153 Multi AV Scanner detection for dropped file 22->153 155 Modifies Windows Defender protection settings 22->155 157 Adds a directory exclusion to Windows Defender 22->157 173 2 other signatures 22->173 35 program.exe 1 108 22->35         started        125 ip-api.com 208.95.112.1, 49707, 49716, 49717 TUT-ASUS United States 26->125 127 api.ipify.org 172.67.74.152, 443, 49706 CLOUDFLARENETUS United States 26->127 101 C:\Users\user\...\SecurityHealthSystray.exe, PE32+ 26->101 dropped 159 Installs new ROOT certificates 26->159 161 Found many strings related to Crypto-Wallets (likely being stolen) 26->161 163 Uses cmd line tools excessively to alter registry or file data 26->163 39 conhost.exe 26->39         started        41 attrib.exe 1 26->41         started        43 attrib.exe 1 26->43         started        45 WMIC.exe 26->45         started        129 147.185.221.23, 33942, 49709, 49712 SALSGIVERUS United States 29->129 103 C:\Users\user\AppData\Roaming\XClient.exe, PE32 29->103 dropped 165 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 29->165 167 Protects its processes via BreakOnTermination flag 29->167 169 Creates multiple autostart registry keys 29->169 171 Uses schtasks.exe or at.exe to add and modify task schedules 29->171 47 schtasks.exe 29->47         started        49 fodhelper.exe 31->49         started        51 fodhelper.exe 31->51         started        53 fodhelper.exe 31->53         started        file9 signatures10 process11 dnsIp12 123 discord.com 162.159.128.233, 443, 49718 CLOUDFLARENETUS United States 35->123 139 Tries to harvest and steal browser information (history, passwords, etc) 35->139 141 Modifies Windows Defender protection settings 35->141 143 Modifies the hosts file 35->143 145 5 other signatures 35->145 55 cmd.exe 35->55         started        58 cmd.exe 35->58         started        60 cmd.exe 35->60         started        66 23 other processes 35->66 62 conhost.exe 47->62         started        64 SecurityHealthSystray.exe 49->64         started        signatures13 process14 signatures15 175 Suspicious powershell command line found 55->175 177 Uses cmd line tools excessively to alter registry or file data 55->177 179 Encrypted powershell cmdline option found 55->179 189 2 other signatures 55->189 68 powershell.exe 55->68         started        71 conhost.exe 55->71         started        181 Modifies Windows Defender protection settings 58->181 73 powershell.exe 58->73         started        75 conhost.exe 58->75         started        183 Adds a directory exclusion to Windows Defender 60->183 77 powershell.exe 60->77         started        79 conhost.exe 60->79         started        81 conhost.exe 64->81         started        185 Writes to foreign memory regions 66->185 187 Tries to harvest and steal WLAN passwords 66->187 83 getmac.exe 66->83         started        85 42 other processes 66->85 process16 file17 147 Loading BitLocker PowerShell Module 68->147 149 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 83->149 151 Writes or reads registry keys via WMI 83->151 93 C:\Users\user\AppData\...\3pyiazzo.cmdline, Unicode 85->93 dropped 88 csc.exe 85->88         started        signatures18 process19 file20 107 C:\Users\user\AppData\Local\...\3pyiazzo.dll, PE32 88->107 dropped 91 cvtres.exe 88->91         started        process21
Threat name:
ByteCode-MSIL.Spyware.AsyncRAT
Status:
Malicious
First seen:
2024-11-17 10:16:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
18 of 24 (75.00%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:xworm collection credential_access defense_evasion discovery execution persistence privilege_escalation rat spyware stealer trojan upx
Behaviour
Detects videocard installed
Gathers system information
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Views/modifies file attributes
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Network Configuration Discovery: Wi-Fi Discovery
Enumerates processes with tasklist
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Obfuscated Files or Information: Command Obfuscation
Checks computer location settings
Clipboard Data
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Command and Scripting Interpreter: PowerShell
Drops file in Drivers directory
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
147.185.221.23:33942
Unpacked files
SH256 hash:
31a2b821e933bb193d94438d4a5aa036519535336c936d65b66889fb03164e2d
MD5 hash:
7439cc991a9a756c41153b8e9121baab
SHA1 hash:
c62528386e5f62ff2975cc8ed0cad3a7d362e632
Detections:
win_xworm_w0 MALWARE_Win_XWorm win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA win_xworm_bytestring MALWARE_Win_AsyncRAT
SH256 hash:
dc23f531b2e23535601968a1453a45565c9214264d4ef3d016c0a983ed720c30
MD5 hash:
7d207c243b33d6f3d78acadffd95ae0e
SHA1 hash:
a3ad8109c208b12d35359e78f4ebc23ed79ccf24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

BlankGrabber

Executable exe dc23f531b2e23535601968a1453a45565c9214264d4ef3d016c0a983ed720c30

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments