Analysis
-
max time kernel
10s -
max time network
44s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-05-2021 17:56
Static task
static1
Behavioral task
behavioral1
Sample
298b235d48e3c7d8b6c8df1635db47cc.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
298b235d48e3c7d8b6c8df1635db47cc.exe
-
Size
754KB
-
MD5
298b235d48e3c7d8b6c8df1635db47cc
-
SHA1
25e305503957099453b98d7590bcd651236ff076
-
SHA256
497c07b12b4e7f9082b872ef2aac2e9619f1dbc82c94993724cd246dd54b38c4
-
SHA512
cb48aabf0f377676ea9cc23c35465f3d7b1d47005261fdee00af41705f835696406dee4429d8d7fd41a7c5d6c1dbaa156bbca70f8744fd9091ddd0c1c113e75d
Malware Config
Extracted
Family
cryptbot
C2
sogxjp62.top
morgyu06.top
Attributes
-
payload_url
http://doucsy08.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1636-60-0x0000000001D50000-0x0000000001E31000-memory.dmp family_cryptbot behavioral1/memory/1636-61-0x0000000000400000-0x00000000004E5000-memory.dmp family_cryptbot -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
298b235d48e3c7d8b6c8df1635db47cc.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 298b235d48e3c7d8b6c8df1635db47cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 298b235d48e3c7d8b6c8df1635db47cc.exe