General

  • Target

    58fa567894c7dc28d2b7f0d7f3886512.exe

  • Size

    721KB

  • Sample

    210715-3jq5yv8dr2

  • MD5

    58fa567894c7dc28d2b7f0d7f3886512

  • SHA1

    d8b23608392d87729b6512046f926d83ec27ffd1

  • SHA256

    7e19416205cfb8e056d4628bdeb635e29cefba04fcb21ee55e7b0077427e4c99

  • SHA512

    a3e45bb8656c53ae0af2a06363013b0379f7370418013ed83d48d4a8af4f70ac0f50ecbb02287480d3f79dd1c5e12e3949e44adf071d03cf4409f6e40592d5b2

Malware Config

Extracted

Family

cryptbot

C2

wymbhy32.top

moriue03.top

Attributes
  • payload_url

    http://hofxuo04.top/download.php?file=lv.exe

Targets

    • Target

      58fa567894c7dc28d2b7f0d7f3886512.exe

    • Size

      721KB

    • MD5

      58fa567894c7dc28d2b7f0d7f3886512

    • SHA1

      d8b23608392d87729b6512046f926d83ec27ffd1

    • SHA256

      7e19416205cfb8e056d4628bdeb635e29cefba04fcb21ee55e7b0077427e4c99

    • SHA512

      a3e45bb8656c53ae0af2a06363013b0379f7370418013ed83d48d4a8af4f70ac0f50ecbb02287480d3f79dd1c5e12e3949e44adf071d03cf4409f6e40592d5b2

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks