MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc68a0a13aa0a1bf5394dd04e59ef2916f0b31a964730a17b0ff4afeac5888dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



KPOTStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: dc68a0a13aa0a1bf5394dd04e59ef2916f0b31a964730a17b0ff4afeac5888dc
SHA3-384 hash: f4182678ea7ed27f9f4532d0db96af712ff294057da22abe334ee3de8c62b2b0af49707921f515de61c5124b43099977
SHA1 hash: 20d395af135774018632b34dd6987ebfe43db43d
MD5 hash: dc02167cff131c6e6c0a2801f1eb3b0c
humanhash: delaware-apart-winner-hawaii
File name:dc02167cff131c6e6c0a2801f1eb3b0c.exe
Download: download sample
Signature KPOTStealer
File size:408'993 bytes
First seen:2020-07-07 18:04:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 12288:pANwRo+mv8QD4+0V16V5WbYmqJbS41uwXLGSnR:pAT8QE+ko58WbZ1uSLGmR
Threatray 68 similar samples on MalwareBazaar
TLSH 1994E135B28181B7D0620936884BD379B53ABB041F7925CFB7DE0E2CDD333592A7529A
Reporter abuse_ch
Tags:exe KPOTStealer


Avatar
abuse_ch
KPOTStealer C2:
http://89.249.67.27/bUjyAvgAIgcicUbB/util.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Creating a file in the Program Files subdirectories
Creating a file in the Windows directory
Deleting a recently created file
Searching for the window
Creating a process from a recently created file
Launching a process
Creating a process with a hidden window
Sending an HTTP GET request
DNS request
Sending a custom TCP request
Reading critical registry keys
Launching a service
Creating a file
Reading Telegram data
Creating a file in the Windows subdirectories
Stealing user critical data
Threat name:
Win32.Trojan.Yakes
Status:
Malicious
First seen:
2020-07-07 18:06:06 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery spyware
Behaviour
Suspicious use of FindShellTrayWindow
Runs ping.exe
Modifies Internet Explorer settings
Checks whether UAC is enabled
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Modifies system certificate store
Suspicious use of WriteProcessMemory
Runs .reg file with regedit
Modifies control panel
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Runs .reg file with regedit
Enumerates system info in registry
Checks whether UAC is enabled
Modifies registry class
Checks processor information in registry
Runs ping.exe
Drops file in Program Files directory
Drops file in Windows directory
Drops file in Windows directory
Drops file in Program Files directory
Checks for installed software on the system
Legitimate hosting services abused for malware hosting/C2
Program crash
Checks for installed software on the system
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Executes dropped EXE
Executes dropped EXE
Suspicious use of NtCreateProcessExOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_kpot_stealer_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

KPOTStealer

Executable exe dc68a0a13aa0a1bf5394dd04e59ef2916f0b31a964730a17b0ff4afeac5888dc

(this sample)

  
Delivery method
Distributed via web download

Comments