MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f92625cc11494c0c5d265ed331354338c45c05658323cfae8ff4a8099351ae05. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara Comments

SHA256 hash: f92625cc11494c0c5d265ed331354338c45c05658323cfae8ff4a8099351ae05
SHA3-384 hash: 037ab1be676ef69da24f57293eb4c75216edf50f041fab7935d359261f80fe7c17f608f8d0ce849b5fb6fd0de5a4b54f
SHA1 hash: a7e40979878f0afb813a429f3d644cebe257740e
MD5 hash: 7ec0decf55d3ce9bf112ca4bdcb7db02
humanhash: cup-michigan-echo-princess
File name:grabbot_0.1.5.5.vir
Download: download sample
Signature n/a
File size:370'176 bytes
First seen:2020-07-19 19:25:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c3a7a420ad4c8848ab000fd9317a003f
ssdeep 6144:Ohq8rHjQ2sFvI5TqMp1bKGZRSj2DvaAAFFWaYUk+nB9kHA0Xm5duA+fbT+U/vnC:OhbTsFvG5KWRSSGAAFsa1dB9kHAEfA+y
TLSH 877412534F6A50B7E067A6BEF6608911DD7941EE935134FB78AC022903823E487FE332
Reporter @tildedennis
Tags:grabbot


Twitter
@tildedennis
grabbot version 0.1.5.5

Intelligence


File Origin
# of uploads :
1
# of downloads :
18
Origin country :
FR FR
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending an HTTP GET request
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Bublik
Status:
Malicious
First seen:
2015-10-10 00:50:00 UTC
AV detection:
22 of 31 (70.97%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of FindShellTrayWindow
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Adds Run key to start application
Deletes itself
Reads user/profile data of web browsers
Threat name:
Unknown
Score:
1.00

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments