General
-
Target
33a16e2862754c9f4bc6711a4517dac4.exe
-
Size
676KB
-
Sample
210715-21y5jt3x16
-
MD5
33a16e2862754c9f4bc6711a4517dac4
-
SHA1
841aa45a975c073ed25627fba062bad741de97cc
-
SHA256
df85a38611751933558ef9e7da81e81025ffc5e5e92cedaf4d97fb0b9f147422
-
SHA512
b1b34246d33cf916a4b5d4899a46139be4d3ac4aaa2279080e92e4e5090670902a42dccbcf90a382ddafda4449e8ba3da3b52e11c7ff859744e88f13b82913ba
Static task
static1
Behavioral task
behavioral1
Sample
33a16e2862754c9f4bc6711a4517dac4.exe
Resource
win7v20210410
Malware Config
Extracted
cryptbot
wymbdu42.top
morkus04.top
-
payload_url
http://hofiwb05.top/download.php?file=lv.exe
Targets
-
-
Target
33a16e2862754c9f4bc6711a4517dac4.exe
-
Size
676KB
-
MD5
33a16e2862754c9f4bc6711a4517dac4
-
SHA1
841aa45a975c073ed25627fba062bad741de97cc
-
SHA256
df85a38611751933558ef9e7da81e81025ffc5e5e92cedaf4d97fb0b9f147422
-
SHA512
b1b34246d33cf916a4b5d4899a46139be4d3ac4aaa2279080e92e4e5090670902a42dccbcf90a382ddafda4449e8ba3da3b52e11c7ff859744e88f13b82913ba
-
CryptBot Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix
Collection
Data from Local System
3Command and Control
Credential Access
Credentials in Files
3Discovery
Query Registry
2Remote System Discovery
1System Information Discovery
2Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation