Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CryptBot | A typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2. | No Attribution |
|
AV Detection |
---|
Source: |
Avira: |
Source: |
ReversingLabs: |
Source: |
Integrated Neural Analysis Model: |
Source: |
Joe Sandbox ML: |
Source: |
Code function: |
8_2_000515B0 | |
Source: |
Code function: |
8_2_6C1714B0 |
Source: |
Binary or memory string: |
memstr_6bc3138c-a |
Source: |
Static PE information: |
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior |
Source: |
Code function: |
8_2_000581E0 | |
Source: |
Code function: |
8_2_6C1EAEC0 | |
Source: |
Code function: |
8_2_6C1EAF70 | |
Source: |
Code function: |
8_2_6C1EAF70 | |
Source: |
Code function: |
8_2_6C190860 | |
Source: |
Code function: |
8_2_6C19A970 | |
Source: |
Code function: |
8_2_6C19A9E0 | |
Source: |
Code function: |
8_2_6C19A9E0 | |
Source: |
Code function: |
8_2_6C18EB10 | |
Source: |
Code function: |
8_2_6C194453 | |
Source: |
Code function: |
8_2_6C2184A0 | |
Source: |
Code function: |
8_2_6C19C510 | |
Source: |
Code function: |
8_2_6C19A580 | |
Source: |
Code function: |
8_2_6C19A5F0 | |
Source: |
Code function: |
8_2_6C19A5F0 | |
Source: |
Code function: |
8_2_6C19E6E0 | |
Source: |
Code function: |
8_2_6C19E6E0 | |
Source: |
Code function: |
8_2_6C210730 | |
Source: |
Code function: |
8_2_6C190740 | |
Source: |
Code function: |
8_2_6C1EC040 | |
Source: |
Code function: |
8_2_6C1EC1A0 | |
Source: |
Code function: |
8_2_6C1CA1E0 | |
Source: |
Code function: |
8_2_6C190260 | |
Source: |
Code function: |
8_2_6C244360 | |
Source: |
Code function: |
8_2_6C1EBD10 | |
Source: |
Code function: |
8_2_6C1E7D10 | |
Source: |
Code function: |
8_2_6C1E3840 | |
Source: |
Code function: |
8_2_6C19D974 | |
Source: |
Code function: |
8_2_6C1C9B60 | |
Source: |
Code function: |
8_2_6C1ABBDB | |
Source: |
Code function: |
8_2_6C1ABBD7 | |
Source: |
Code function: |
8_2_6C1EB4D0 | |
Source: |
Code function: |
8_2_6C19D504 | |
Source: |
Code function: |
8_2_6C1E9600 | |
Source: |
Code function: |
8_2_6C19D674 | |
Source: |
Code function: |
8_2_6C1E3690 | |
Source: |
Code function: |
8_2_6C19D7F4 | |
Source: |
Code function: |
8_2_6C213140 | |
Source: |
Code function: |
8_2_6C18B1D0 | |
Source: |
Code function: |
8_2_6C19D2A0 | |
Source: |
Code function: |
8_2_6C207350 |
Source: |
Memory has grown: |
Networking |
---|
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
Source: |
HTTP traffic detected: |
||
Source: |
HTTP traffic detected: |