General
-
Target
58fa567894c7dc28d2b7f0d7f3886512.exe
-
Size
721KB
-
Sample
210715-3jq5yv8dr2
-
MD5
58fa567894c7dc28d2b7f0d7f3886512
-
SHA1
d8b23608392d87729b6512046f926d83ec27ffd1
-
SHA256
7e19416205cfb8e056d4628bdeb635e29cefba04fcb21ee55e7b0077427e4c99
-
SHA512
a3e45bb8656c53ae0af2a06363013b0379f7370418013ed83d48d4a8af4f70ac0f50ecbb02287480d3f79dd1c5e12e3949e44adf071d03cf4409f6e40592d5b2
Static task
static1
Behavioral task
behavioral1
Sample
58fa567894c7dc28d2b7f0d7f3886512.exe
Resource
win7v20210410
Malware Config
Extracted
cryptbot
wymbhy32.top
moriue03.top
-
payload_url
http://hofxuo04.top/download.php?file=lv.exe
Targets
-
-
Target
58fa567894c7dc28d2b7f0d7f3886512.exe
-
Size
721KB
-
MD5
58fa567894c7dc28d2b7f0d7f3886512
-
SHA1
d8b23608392d87729b6512046f926d83ec27ffd1
-
SHA256
7e19416205cfb8e056d4628bdeb635e29cefba04fcb21ee55e7b0077427e4c99
-
SHA512
a3e45bb8656c53ae0af2a06363013b0379f7370418013ed83d48d4a8af4f70ac0f50ecbb02287480d3f79dd1c5e12e3949e44adf071d03cf4409f6e40592d5b2
-
CryptBot Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix
Collection
Data from Local System
3Command and Control
Credential Access
Credentials in Files
3Discovery
Query Registry
2Remote System Discovery
1System Information Discovery
2Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation