MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc2a8472021c1f37e7ba14fd51259d37d10bd030ecd33134ebf42d3279ab860a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CryptBot


Vendor detections: 10


Intelligence 10 IOCs YARA 6 File information Comments

SHA256 hash: fc2a8472021c1f37e7ba14fd51259d37d10bd030ecd33134ebf42d3279ab860a
SHA3-384 hash: 8d5e74d02a2cc9f742f3ead886f7277451102dfdb04263c98ef8275b46c5ef1f6d00da17ff4ea3d9a210f1ac7ec9f752
SHA1 hash: d54c5a5e8cc9e6b588b1b66f066ea3ca708faed6
MD5 hash: 7810da5efbf93fe7d8a73d6e7d4d6375
humanhash: black-jig-ack-hot
File name:setup.exe
Download: download sample
Signature CryptBot
File size:1'957'425 bytes
First seen:2021-03-03 17:05:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a1a66d588dcf1394354ebf6ec400c223 (49 x RedLineStealer, 7 x CryptBot, 4 x AZORult)
ssdeep 49152:A5+hFPgbk5Y+MfBPjf0c1hjj4hw1mK/Rg+NIYguDGUzbgRFYTC8w96xWyu8MKEkE:A5aFbQPjf0khjSK/e+NVgp8bgRFnf6xY
Threatray 62 similar samples on MalwareBazaar
TLSH 8A95125011D240BDDA830B3028D8F1512A7AC722BB3915DB322E6546CF76AEBB73E577
Reporter suspicious_link
Tags:CryptBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup.exe
Verdict:
Malicious activity
Analysis date:
2021-03-03 16:54:49 UTC
Tags:
autoit stealer trojan loader evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Deleting a recently created file
DNS request
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba
Detection:
malicious
Classification:
troj.spyw.evad
Score:
88 / 100
Signature
Contains functionality to register a low level keyboard hook
Found many strings related to Crypto-Wallets (likely being stolen)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Submitted sample is a known malware sample
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Glupteba
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 362176 Sample: setup.exe Startdate: 03/03/2021 Architecture: WINDOWS Score: 88 41 moraxisw03.top 2->41 43 kaervu35.top 2->43 45 3 other IPs or domains 2->45 57 Malicious sample detected (through community Yara rule) 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 Yara detected Glupteba 2->61 63 4 other signatures 2->63 10 setup.exe 8 2->10         started        signatures3 process4 signatures5 65 Contains functionality to register a low level keyboard hook 10->65 13 cmd.exe 1 10->13         started        15 cmd.exe 1 10->15         started        process6 signatures7 18 cmd.exe 2 13->18         started        21 conhost.exe 13->21         started        67 Submitted sample is a known malware sample 15->67 23 conhost.exe 15->23         started        process8 signatures9 51 Obfuscated command line found 18->51 53 Uses ping.exe to sleep 18->53 25 Tenerezza.com 18->25         started        27 PING.EXE 1 18->27         started        30 findstr.exe 1 18->30         started        process10 dnsIp11 33 Tenerezza.com 30 25->33         started        47 127.0.0.1 unknown unknown 27->47 49 192.168.2.1 unknown unknown 27->49 37 C:\Users\user\AppData\Local\...\Tenerezza.com, Targa 30->37 dropped file12 process13 dnsIp14 39 gCflNJVhZyuzDhFwzAAMWPlZTPyvW.gCflNJVhZyuzDhFwzAAMWPlZTPyvW 33->39 55 Tries to harvest and steal browser information (history, passwords, etc) 33->55 signatures15
Threat name:
Win32.Trojan.Bsymem
Status:
Malicious
First seen:
2021-03-03 17:06:06 UTC
AV detection:
12 of 29 (41.38%)
Threat level:
  5/5
Result
Malware family:
cryptbot
Score:
  10/10
Tags:
family:cryptbot discovery evasion spyware stealer
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Drops startup file
Loads dropped DLL
Modifies file permissions
Blocklisted process makes network request
Executes dropped EXE
Sets file to hidden
CryptBot
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_CryptBot
Author:ditekSHen
Description:CryptBot/Fugrafa stealer payload
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CryptBot

Executable exe fc2a8472021c1f37e7ba14fd51259d37d10bd030ecd33134ebf42d3279ab860a

(this sample)

Comments