General

  • Target

    3d0e5373aca6a5886729b695dbbd85d8.exe

  • Size

    737KB

  • Sample

    210527-jtg5ctgvpn

  • MD5

    3d0e5373aca6a5886729b695dbbd85d8

  • SHA1

    5d60a1fc7918a1b692d339dfaa9580c80a885ba4

  • SHA256

    4b21de4f5c03de8e7e85bbdc317bd1050ba7bce099c1ba1cafb949ccadff90a2

  • SHA512

    0391e0ea037993de09d52ff9866ec17286d7e6af854a3ec1067ec75c0632e6072d77d4d423a85c011f12a2ded67f466f18a0327e43cf313cc028411835ae1938

Malware Config

Extracted

Family

cryptbot

C2

geowqr42.top

morckp04.top

Attributes
  • payload_url

    http://rogaow06.top/download.php?file=lv.exe

Extracted

Family

danabot

Version

1827

Botnet

3

C2

184.95.51.183:443

184.95.51.175:443

192.210.198.12:443

184.95.51.180:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      3d0e5373aca6a5886729b695dbbd85d8.exe

    • Size

      737KB

    • MD5

      3d0e5373aca6a5886729b695dbbd85d8

    • SHA1

      5d60a1fc7918a1b692d339dfaa9580c80a885ba4

    • SHA256

      4b21de4f5c03de8e7e85bbdc317bd1050ba7bce099c1ba1cafb949ccadff90a2

    • SHA512

      0391e0ea037993de09d52ff9866ec17286d7e6af854a3ec1067ec75c0632e6072d77d4d423a85c011f12a2ded67f466f18a0327e43cf313cc028411835ae1938

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot Payload

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks