General
-
Target
ec36989321fb62bb857a24a53d1491fd.exe
-
Size
694KB
-
Sample
210715-hm11l7wxv2
-
MD5
ec36989321fb62bb857a24a53d1491fd
-
SHA1
28de531b6da8f80b0452c109dcf30bc1efee23f9
-
SHA256
eb4e54c1372f7002b2b49a9918e67f84d65e52f1b12c5b7313420a48d5305e41
-
SHA512
e71009f296d2b9cb07c6a30fe0798db527aa756177478116b53067e8b55ae17d2ebdb7b4ecb9587fe052d424fa643e9bf3ecd0821d613a0545f8546702c722b7
Static task
static1
Behavioral task
behavioral1
Sample
ec36989321fb62bb857a24a53d1491fd.exe
Resource
win7v20210410
Malware Config
Extracted
cryptbot
wymbdu42.top
morkus04.top
-
payload_url
http://hofiwb05.top/download.php?file=lv.exe
Targets
-
-
Target
ec36989321fb62bb857a24a53d1491fd.exe
-
Size
694KB
-
MD5
ec36989321fb62bb857a24a53d1491fd
-
SHA1
28de531b6da8f80b0452c109dcf30bc1efee23f9
-
SHA256
eb4e54c1372f7002b2b49a9918e67f84d65e52f1b12c5b7313420a48d5305e41
-
SHA512
e71009f296d2b9cb07c6a30fe0798db527aa756177478116b53067e8b55ae17d2ebdb7b4ecb9587fe052d424fa643e9bf3ecd0821d613a0545f8546702c722b7
-
CryptBot Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix
Collection
Data from Local System
3Command and Control
Credential Access
Credentials in Files
3Discovery
Query Registry
2Remote System Discovery
1System Information Discovery
2Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation