Sample name: | WzyLDvldFI.exerenamed because original name is a hash value |
Original sample name: | b2cf79370b6c115f2f5f44372fc917b0.exe |
Analysis ID: | 1580279 |
MD5: | b2cf79370b6c115f2f5f44372fc917b0 |
SHA1: | ab92465543a7e36348ac93de665f7d89149a6ff3 |
SHA256: | 9e81d28cfca40a37cc19537bcacea75f9c578840b138dd8c254e20aaca418ee2 |
Tags: | exeuser-abuse_ch |
Infos: | |
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CryptBot | A typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2. | No Attribution |
|
AV Detection |
---|
Source: |
Avira: |
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
Source: |
Integrated Neural Analysis Model: |
Source: |
Joe Sandbox ML: |
Source: |
Code function: |
8_2_004715B0 | |
Source: |
Code function: |
8_2_6C6314B0 |
Source: |
Binary or memory string: |
memstr_13c5fe7d-5 |
Source: |
Static PE information: |
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior |
Source: |
Code function: |
8_2_004781E0 | |
Source: |
Code function: |
8_2_6C650860 | |
Source: |
Code function: |
8_2_6C65A970 | |
Source: |
Code function: |
8_2_6C6FC920 | |
Source: |
Code function: |
8_2_6C65A9E0 | |
Source: |
Code function: |
8_2_6C65A9E0 | |
Source: |
Code function: |
8_2_6C64EB10 | |
Source: |
Code function: |
8_2_6C6C6BF0 | |
Source: |
Code function: |
8_2_6C6D84A0 | |
Source: |
Code function: |
8_2_6C65C510 | |
Source: |
Code function: |
8_2_6C65A5F0 | |
Source: |
Code function: |
8_2_6C65A5F0 | |
Source: |
Code function: |
8_2_6C65A580 | |
Source: |
Code function: |
8_2_6C65E6E0 | |
Source: |
Code function: |
8_2_6C65E6E0 | |
Source: |
Code function: |
8_2_6C650740 | |
Source: |
Code function: |
8_2_6C6D0730 | |
Source: |
Code function: |
8_2_6C68A1E0 | |
Source: |
Code function: |
8_2_6C650260 | |
Source: |
Code function: |
8_2_6C704360 | |
Source: |
Code function: |
8_2_6C6A7D10 | |
Source: |
Code function: |
8_2_6C6A3840 | |
Source: |
Code function: |
8_2_6C65D974 | |
Source: |
Code function: |
8_2_6C66BBD7 | |
Source: |
Code function: |
8_2_6C66BBDB | |
Source: |
Code function: |
8_2_6C6AB4D0 | |
Source: |
Code function: |
8_2_6C65D504 | |
Source: |
Code function: |
8_2_6C65D674 | |
Source: |
Code function: |
8_2_6C6A9600 | |
Source: |
Code function: |
8_2_6C6A3690 | |
Source: |
Code function: |
8_2_6C65D7F4 | |
Source: |
Code function: |
8_2_6C6D3140 | |
Source: |
Code function: |
8_2_6C6AB1F0 | |
Source: |
Code function: |
8_2_6C64B1D0 | |
Source: |
Code function: |
8_2_6C65D2A0 | |
Source: |
Code function: |
8_2_6C6C73A0 |
Source: |
Memory has grown: |
Networking |
---|
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |