MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eb14b66b263d66a5f9c3388d6a1a8b140a459815a70de76b9f31052c7884f623. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cambot


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: eb14b66b263d66a5f9c3388d6a1a8b140a459815a70de76b9f31052c7884f623
SHA3-384 hash: f5a3ae48c4fffad1ea554dcc553a498ef1ad95aec17e7997551c23435920fd6eb164b641ece88bb11abc5bf1a23c45cc
SHA1 hash: 0fe9cce5cb3ff1e8e49855620ec692aa6e1fa9de
MD5 hash: bba8d680e17b1003d7c49b5211168a9b
humanhash: wyoming-hydrogen-two-pennsylvania
File name:eb14b66b263d66a5f9c3388d6a1a8b140a459815a70de76b9f31052c7884f623
Download: download sample
Signature Cambot
File size:207'832 bytes
First seen:2020-07-06 07:14:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3e8ae3bc85823ef9afa9731fe8e9fda0 (11 x Cambot, 4 x BlackShades)
ssdeep 3072:3Hjk+0oLnWFnzBHv/xWFsg8WatFBGFVWPE5ac0pG/1z+QVMbg1NWGw:Xo/BHng5HaVG4G/1z+QVMbg10Gw
Threatray 278 similar samples on MalwareBazaar
TLSH 7914AE33B3D40A85E9AEDB713BA9C6F9662375187F23618A2108677D7C15E204C19B2F
Reporter JAMESWT_WT
Tags:Cambot

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
DNS request
Sending an HTTP GET request
Moving of the original file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun
Threat name:
Win32.Worm.Cambot
Status:
Malicious
First seen:
2018-12-29 06:26:11 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
31 of 31 (100.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
persistence worm family:vobfus
Behaviour
Script User-Agent
Suspicious use of SetWindowsHookEx
Suspicious behavior: RenamesItself
Suspicious behavior: GetForegroundWindowSpam
Adds Run entry to start application
Adds Run entry to policy start application
Vobfus
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_blackshades_w0
Author:Jean-Philippe Teissier / @Jipe_
Rule name:win_vobfus_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments