Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CryptBot | A typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2. | No Attribution |
|
AV Detection |
---|
Source: |
Avira: |
Source: |
ReversingLabs: |
Source: |
ReversingLabs: |
Source: |
Integrated Neural Analysis Model: |
Source: |
Joe Sandbox ML: |
Source: |
Code function: |
8_2_004F15B0 | |
Source: |
Code function: |
8_2_6BD914B0 |
Source: |
Binary or memory string: |
memstr_a30f3dcd-2 |
Source: |
Static PE information: |
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior |
Source: |
Code function: |
8_2_004F81E0 | |
Source: |
Code function: |
8_2_6BE26BF0 | |
Source: |
Code function: |
8_2_6BDAEB10 | |
Source: |
Code function: |
8_2_6BDBA9E0 | |
Source: |
Code function: |
8_2_6BDBA9E0 | |
Source: |
Code function: |
8_2_6BDBA970 | |
Source: |
Code function: |
8_2_6BE5C920 | |
Source: |
Code function: |
8_2_6BDB0860 | |
Source: |
Code function: |
8_2_6BDF6F29 | |
Source: |
Code function: |
8_2_6BDF6F25 | |
Source: |
Code function: |
8_2_6BDF6F21 | |
Source: |
Code function: |
8_2_6BDE8CE0 | |
Source: |
Code function: |
8_2_6BE64360 | |
Source: |
Code function: |
8_2_6BDB0260 | |
Source: |
Code function: |
8_2_6BDEA1E0 | |
Source: |
Code function: |
8_2_6BDB0740 | |
Source: |
Code function: |
8_2_6BE30730 | |
Source: |
Code function: |
8_2_6BDBE6E0 | |
Source: |
Code function: |
8_2_6BDBE6E0 | |
Source: |
Code function: |
8_2_6BDBA5F0 | |
Source: |
Code function: |
8_2_6BDBA5F0 | |
Source: |
Code function: |
8_2_6BDBA580 | |
Source: |
Code function: |
8_2_6BDBC510 | |
Source: |
Code function: |
8_2_6BE384A0 | |
Source: |
Code function: |
8_2_6BDCBBDB | |
Source: |
Code function: |
8_2_6BDCBBD7 | |
Source: |
Code function: |
8_2_6BDBD974 | |
Source: |
Code function: |
8_2_6BE03840 | |
Source: |
Code function: |
8_2_6BE07E80 | |
Source: |
Code function: |
8_2_6BDF7D9F | |
Source: |
Code function: |
8_2_6BDF7D95 | |
Source: |
Code function: |
8_2_6BDF7D91 | |
Source: |
Code function: |
8_2_6BE07D10 | |
Source: |
Code function: |
8_2_6BE27350 | |
Source: |
Code function: |
8_2_6BDBD2A0 | |
Source: |
Code function: |
8_2_6BDAB1D0 | |
Source: |
Code function: |
8_2_6BE0B1F0 | |
Source: |
Code function: |
8_2_6BE33140 | |
Source: |
Code function: |
8_2_6BDBD7F4 | |
Source: |
Code function: |
8_2_6BE03690 | |
Source: |
Code function: |
8_2_6BDBD674 | |
Source: |
Code function: |
8_2_6BE09600 | |
Source: |
Code function: |
8_2_6BDBD504 | |
Source: |
Code function: |
8_2_6BE0B4D0 |
Source: |
Memory has grown: |
Networking |
---|
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |