MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f611711bbcb210e6e679026be24fd78215dc623abfb926d6811274eec16a3ca7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 9


Intelligence 9 IOCs 3 YARA 12 File information Comments 1

SHA256 hash: f611711bbcb210e6e679026be24fd78215dc623abfb926d6811274eec16a3ca7
SHA3-384 hash: eebace35267c7419597a150942e56ec2557946e61a29cf3fd467a5b88825950ae6893ead4b6db97054a68a4f63472f56
SHA1 hash: 94507d63cf324a8607c426150e4d27b1f8d9efb4
MD5 hash: 4509d3b2a883cf33fcaa8452a229a34d
humanhash: lake-autumn-island-echo
File name:4509D3B2A883CF33FCAA8452A229A34D.exe
Download: download sample
Signature CryptBot
File size:350'720 bytes
First seen:2021-05-24 21:20:23 UTC
Last seen:2021-05-24 23:01:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d5928446ed957358e32c664070d1dcd3 (2 x CryptBot)
ssdeep 6144:l7rZhuYdIqahrnHmEFdCLnG4vWvtNf1VdIqVKQwsmEg3T8PpSt:l7rZhLdIqahrnh0LfvWvL17IqVKQyEgt
Threatray 418 similar samples on MalwareBazaar
TLSH 5D74AE01A7D1C034F1B322F84B7953A9953E7EE16B3891CF52D62AEA5A746E0EC30317
Reporter abuse_ch
Tags:CryptBot exe


Avatar
abuse_ch
CryptBot C2:
http://morbqm01.top/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://morbqm01.top/index.php https://threatfox.abuse.ch/ioc/58050/
188.40.193.6:43143 https://threatfox.abuse.ch/ioc/59214/
http://geotel12.top/index.php https://threatfox.abuse.ch/ioc/59215/

Intelligence


File Origin
# of uploads :
2
# of downloads :
161
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4509D3B2A883CF33FCAA8452A229A34D.exe
Verdict:
Malicious activity
Analysis date:
2021-05-24 21:24:06 UTC
Tags:
trojan loader rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Deleting a recently created file
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Sending an HTTP GET request
Launching a process
Creating a file
Sending an HTTP POST request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Stealing user critical data
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cryptbot Glupteba RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample or dropped binary is a compiled AutoHotkey binary
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Cryptbot
Yara detected Evader
Yara detected Glupteba
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 423276 Sample: Th25cuuLsE.exe Startdate: 24/05/2021 Architecture: WINDOWS Score: 100 89 DQzwIhMqSHBcSx.DQzwIhMqSHBcSx 2->89 123 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->123 125 Multi AV Scanner detection for domain / URL 2->125 127 Found malware configuration 2->127 129 13 other signatures 2->129 11 Th25cuuLsE.exe 36 2->11         started        signatures3 process4 dnsIp5 111 gclean.biz 8.209.75.180, 49723, 49725, 49726 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 11->111 113 iplogger.org 88.99.66.31, 443, 49742, 49743 HETZNER-ASDE Germany 11->113 115 3 other IPs or domains 11->115 79 C:\Users\user\AppData\...\21985235887.exe, PE32 11->79 dropped 81 C:\Users\user\AppData\...\17445010156.exe, PE32 11->81 dropped 83 C:\Users\user\AppData\...\00559529643.exe, PE32 11->83 dropped 85 10 other files (7 malicious) 11->85 dropped 153 Detected unpacking (changes PE section rights) 11->153 155 Detected unpacking (overwrites its own PE header) 11->155 16 cmd.exe 11->16         started        18 cmd.exe 1 11->18         started        20 cmd.exe 1 11->20         started        22 2 other processes 11->22 file6 signatures7 process8 process9 24 21985235887.exe 16->24         started        29 conhost.exe 16->29         started        31 00559529643.exe 15 3 18->31         started        33 conhost.exe 18->33         started        35 17445010156.exe 48 20->35         started        37 conhost.exe 20->37         started        39 Garbage Cleaner.exe 22->39         started        41 conhost.exe 22->41         started        43 2 other processes 22->43 dnsIp10 109 2 other IPs or domains 24->109 67 C:\Users\user\AppData\...\edspolishpp.exe, PE32 24->67 dropped 137 Detected unpacking (changes PE section rights) 24->137 139 Detected unpacking (overwrites its own PE header) 24->139 141 Sample or dropped binary is a compiled AutoHotkey binary 24->141 45 edspolishpp.exe 24->45         started        97 pt.bitrhost.ru 217.107.34.191, 443, 49733, 49751 RTCOMM-ASRU Russian Federation 31->97 99 192.168.2.1 unknown unknown 31->99 143 Writes to foreign memory regions 31->143 145 Allocates memory in foreign processes 31->145 147 Sample uses process hollowing technique 31->147 149 Injects a PE file into a foreign processes 31->149 49 AddInProcess32.exe 16 43 31->49         started        101 geotel12.top 34.73.205.209, 49779, 80 GOOGLEUS United States 35->101 103 morbqm01.top 35.229.92.135, 49782, 80 GOOGLEUS United States 35->103 105 roggmq01.top 35->105 69 C:\Users\user\AppData\Local\...\XpoAfthF.exe, PE32 35->69 dropped 151 Tries to harvest and steal browser information (history, passwords, etc) 35->151 51 cmd.exe 35->51         started        107 iplogger.org 39->107 file11 signatures12 process13 dnsIp14 117 y0y.gofast24.ru 45->117 157 Writes to foreign memory regions 45->157 159 Allocates memory in foreign processes 45->159 161 Sample uses process hollowing technique 45->161 163 Injects a PE file into a foreign processes 45->163 53 AddInProcess32.exe 45->53         started        119 xanerlaychi.xyz 79.133.98.32, 49746, 49752, 49753 NEOHOST-ASUA Russian Federation 49->119 121 api.ip.sb 49->121 165 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 49->165 167 Performs DNS queries to domains with low reputation 49->167 169 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 49->169 171 Tries to steal Crypto Currency Wallets 49->171 57 iexplore.exe 49->57         started        59 XpoAfthF.exe 51->59         started        62 conhost.exe 51->62         started        signatures15 process16 dnsIp17 91 xisolenoy.xyz 185.183.98.2, 49758, 49777, 49780 HSAE Netherlands 53->91 93 api.ip.sb 53->93 131 Tries to harvest and steal browser information (history, passwords, etc) 53->131 133 Tries to steal Crypto Currency Wallets 53->133 95 iplogger.org 57->95 64 iexplore.exe 57->64         started        71 C:\Users\user\AppData\Local\Temp\...\vpn.exe, PE32 59->71 dropped 73 C:\Users\user\AppData\Local\Temp\...\UAC.dll, PE32 59->73 dropped 75 C:\Program Files (x86)\...\adprovider.dll, PE32 59->75 dropped 77 2 other files (none is malicious) 59->77 dropped 135 Machine Learning detection for dropped file 59->135 file18 signatures19 process20 dnsIp21 87 iplogger.org 64->87
Threat name:
Win32.Trojan.RanumBot
Status:
Malicious
First seen:
2021-05-23 16:36:12 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:AutoIT_Script
Author:@bartblaze
Description:Identifies AutoIT script.
Rule name:INDICATOR_SUSPICIOUS_AHK_Downloader
Author:ditekSHen
Description:Detects AutoHotKey binaries acting as second stage droppers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_CryptBot
Author:ditekSHen
Description:CryptBot/Fugrafa stealer payload
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_RedLineDropperAHK
Author:ditekSHen
Description:Detects AutoIt/AutoHotKey executables dropping RedLine infostealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-24 21:59:45 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0012.001] Anti-Static Analysis::Argument Obfuscation
1) [C0003.001] Communication Micro-objective::Create Pipe::Interprocess Communication
2) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
3) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
4) [C0045] File System Micro-objective::Copy File
5) [C0049] File System Micro-objective::Get File Attributes
6) [C0051] File System Micro-objective::Read File
7) [C0052] File System Micro-objective::Writes File
8) [C0007] Memory Micro-objective::Allocate Memory
9) [C0033] Operating System Micro-objective::Console
10) [C0040] Process Micro-objective::Allocate Thread Local Storage
11) [C0043] Process Micro-objective::Check Mutex
12) [C0041] Process Micro-objective::Set Thread Local Storage Value
13) [C0018] Process Micro-objective::Terminate Process