MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fc8502c4a245ffff9871e4fb368169fcc36ce195935438469e6068f4f90e1e9e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
KPOTStealer
Vendor detections: 10
| SHA256 hash: | fc8502c4a245ffff9871e4fb368169fcc36ce195935438469e6068f4f90e1e9e |
|---|---|
| SHA3-384 hash: | 47c8f94d8a087a55af1c162cca9cba1c5816964c016b3957c5c4598b8bec0ada997ef302ad4030905f4d967f18d046a2 |
| SHA1 hash: | ec344e65b2351df1f99ac8c7128db0f762a203d7 |
| MD5 hash: | 5d74f9af6fbbc30ef5e14e27c2cbdefd |
| humanhash: | hamper-steak-illinois-beryllium |
| File name: | 5d74f9af6fbbc30ef5e14e27c2cbdefd.exe |
| Download: | download sample |
| Signature | KPOTStealer |
| File size: | 462'336 bytes |
| First seen: | 2022-01-12 09:59:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 001cb942f01749e7a393ca23aaa78d09 (2 x CoinMiner, 2 x OnlyLogger, 1 x RedLineStealer) |
| ssdeep | 12288:7SDoeQuKq0W2jWZJU60NA68nLMqqX9zv7unn:7SDoe10W27LC6oL+Tc |
| TLSH | T175A4E03139DCC471C4635E354955CAA0EA7AF8336B31A58737A0162A5F30FCD8AE639E |
| File icon (PE): | |
| dhash icon | fcfcb4f4d4d4d8c0 (19 x RedLineStealer, 16 x RaccoonStealer, 14 x Smoke Loader) |
| Reporter | |
| Tags: | exe KPOTStealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
271
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5d74f9af6fbbc30ef5e14e27c2cbdefd.exe
Verdict:
Malicious activity
Analysis date:
2022-01-12 10:30:29 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching the default Windows debugger (dwwin.exe)
Searching for the window
DNS request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
KPot
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Creates autostart registry keys with suspicious names
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected KPot
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2022-01-12 04:43:31 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
25 of 28 (89.29%)
Threat level:
5/5
Detection(s):
Malicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
7cc14bc5997f175a645d73decb9a0498652bd50266a37f8f5a6a7e4bdd0db562
MD5 hash:
97bf9646025824e5ae45b515b2d95d19
SHA1 hash:
a3120785fb942db5859605d3f018de33bd1000ce
Detections:
win_misha_w0
Parent samples :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 hash:
fc8502c4a245ffff9871e4fb368169fcc36ce195935438469e6068f4f90e1e9e
MD5 hash:
5d74f9af6fbbc30ef5e14e27c2cbdefd
SHA1 hash:
ec344e65b2351df1f99ac8c7128db0f762a203d7
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.