MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f6b75a5605bba229b8d426fbaf789780d46981eb71a01c80d0177f1883930482. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: f6b75a5605bba229b8d426fbaf789780d46981eb71a01c80d0177f1883930482
SHA3-384 hash: 0528ee85a42178ae4da508f7fe7bf008cf3e2671b2ee0c921c3107bb8d34c856b758b34bd605ac300c861a0190017f62
SHA1 hash: ebc2f22a30e32152b13fe0911f3b15f682d1ff8e
MD5 hash: 041928bb86afc5e54bac2cbe6fa082dc
humanhash: leopard-kilo-nevada-early
File name:grabbot_0.1.5.0.vir
Download: download sample
Signature n/a
File size:453'632 bytes
First seen:2020-07-19 17:33:46 UTC
Last seen:2020-07-19 19:20:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2cefed2c59a19347bbbf8ee164b82ea9
ssdeep 12288:hA/pJ30OvUxSO0L7jmz8AH9kSGFerHCC+6yKi+rd:hmg07aHah0CCAKi+h
TLSH AFA4124584AD708FE475573E86072D8706DBA9931793AF8F74508EB0365A2F68E33E23
Reporter @tildedennis
Tags:grabbot


Twitter
@tildedennis
grabbot version 0.1.5.0

Intelligence


File Origin
# of uploads :
2
# of downloads :
20
Origin country :
US US
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Hyteod
Status:
Malicious
First seen:
2015-03-24 00:19:00 UTC
AV detection:
21 of 25 (84.00%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Deletes itself
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments