General
-
Target
3d0e5373aca6a5886729b695dbbd85d8.exe
-
Size
737KB
-
Sample
210527-jtg5ctgvpn
-
MD5
3d0e5373aca6a5886729b695dbbd85d8
-
SHA1
5d60a1fc7918a1b692d339dfaa9580c80a885ba4
-
SHA256
4b21de4f5c03de8e7e85bbdc317bd1050ba7bce099c1ba1cafb949ccadff90a2
-
SHA512
0391e0ea037993de09d52ff9866ec17286d7e6af854a3ec1067ec75c0632e6072d77d4d423a85c011f12a2ded67f466f18a0327e43cf313cc028411835ae1938
Static task
static1
Behavioral task
behavioral1
Sample
3d0e5373aca6a5886729b695dbbd85d8.exe
Resource
win7v20210410
Malware Config
Extracted
cryptbot
geowqr42.top
morckp04.top
-
payload_url
http://rogaow06.top/download.php?file=lv.exe
Extracted
danabot
1827
3
184.95.51.183:443
184.95.51.175:443
192.210.198.12:443
184.95.51.180:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
3d0e5373aca6a5886729b695dbbd85d8.exe
-
Size
737KB
-
MD5
3d0e5373aca6a5886729b695dbbd85d8
-
SHA1
5d60a1fc7918a1b692d339dfaa9580c80a885ba4
-
SHA256
4b21de4f5c03de8e7e85bbdc317bd1050ba7bce099c1ba1cafb949ccadff90a2
-
SHA512
0391e0ea037993de09d52ff9866ec17286d7e6af854a3ec1067ec75c0632e6072d77d4d423a85c011f12a2ded67f466f18a0327e43cf313cc028411835ae1938
-
CryptBot Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-