Sample name: | mPQW1NB2Px.exerenamed because original name is a hash value |
Original sample name: | 2b39bc094a36c474dea04d0bb8e22356.exe |
Analysis ID: | 1579684 |
MD5: | 2b39bc094a36c474dea04d0bb8e22356 |
SHA1: | 115e4f12506c0fdf4db9b19c94e526040c94cf02 |
SHA256: | 6bc9ae5b97c21197dbec153f9d9420d7c5976ecf5ad1a40449474c019006db98 |
Tags: | exeuser-abuse_ch |
Infos: | |
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CryptBot | A typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2. | No Attribution |
|
AV Detection |
---|
Source: |
Avira: |
Source: |
Malware Configuration Extractor: |
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
Source: |
Integrated Neural Analysis Model: |
Source: |
Joe Sandbox ML: |
Source: |
Code function: |
9_2_005315B0 | |
Source: |
Code function: |
9_2_6C7614B0 |
Source: |
Binary or memory string: |
memstr_f9492060-9 |
Source: |
Static PE information: |
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior |
Source: |
Code function: |
9_2_005381E0 | |
Source: |
Code function: |
9_2_6C7DAEC0 | |
Source: |
Code function: |
9_2_6C7DAF70 | |
Source: |
Code function: |
9_2_6C7DAF70 | |
Source: |
Code function: |
9_2_6C780860 | |
Source: |
Code function: |
9_2_6C78A970 | |
Source: |
Code function: |
9_2_6C78A9E0 | |
Source: |
Code function: |
9_2_6C78A9E0 | |
Source: |
Code function: |
9_2_6C77EB10 | |
Source: |
Code function: |
9_2_6C8084A0 | |
Source: |
Code function: |
9_2_6C784453 | |
Source: |
Code function: |
9_2_6C78C510 | |
Source: |
Code function: |
9_2_6C78A5F0 | |
Source: |
Code function: |
9_2_6C78A5F0 | |
Source: |
Code function: |
9_2_6C78A580 | |
Source: |
Code function: |
9_2_6C78E6E0 | |
Source: |
Code function: |
9_2_6C78E6E0 | |
Source: |
Code function: |
9_2_6C780740 | |
Source: |
Code function: |
9_2_6C800730 | |
Source: |
Code function: |
9_2_6C7DC040 | |
Source: |
Code function: |
9_2_6C7BA1E0 | |
Source: |
Code function: |
9_2_6C7DC1A0 | |
Source: |
Code function: |
9_2_6C780260 | |
Source: |
Code function: |
9_2_6C834360 | |
Source: |
Code function: |
9_2_6C7DBD10 | |
Source: |
Code function: |
9_2_6C7D7D10 | |
Source: |
Code function: |
9_2_6C7D3840 | |
Source: |
Code function: |
9_2_6C78D974 | |
Source: |
Code function: |
9_2_6C7B9B60 | |
Source: |
Code function: |
9_2_6C79BBDB | |
Source: |
Code function: |
9_2_6C79BBD7 | |
Source: |
Code function: |
9_2_6C7DB4D0 | |
Source: |
Code function: |
9_2_6C78D504 | |
Source: |
Code function: |
9_2_6C78D674 | |
Source: |
Code function: |
9_2_6C7D9600 | |
Source: |
Code function: |
9_2_6C7D3690 | |
Source: |
Code function: |
9_2_6C78D7F4 | |
Source: |
Code function: |
9_2_6C77B1D0 | |
Source: |
Code function: |
9_2_6C803140 | |
Source: |
Code function: |
9_2_6C78D2A0 | |
Source: |
Code function: |
9_2_6C7F7350 |
Source: |
Memory has grown: |
Networking |
---|
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
Source: |
URLs: |
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |