General
-
Target
d066ad4ead3311db15867482abe1925b.exe
-
Size
656KB
-
Sample
210715-jxbafj4kxn
-
MD5
d066ad4ead3311db15867482abe1925b
-
SHA1
c06c8c4aeed35c7d8a523bb9d489fbceca324dbc
-
SHA256
af8df57ba3941ed8fa89543e4e98f2da5dfe7a0efaaa72aaca4c54ea9f5ccc58
-
SHA512
c7f8cd55b69ada93dfd63f23e73636dc503e38545d9c7ee41563009c8879ce8e38f24b7de330e4891e745f0697c754d3d60befa3b23a1bc3d3cb3d2060101710
Static task
static1
Behavioral task
behavioral1
Sample
d066ad4ead3311db15867482abe1925b.exe
Resource
win7v20210408
Malware Config
Extracted
cryptbot
wymbhy32.top
moriue03.top
-
payload_url
http://hofxuo04.top/download.php?file=lv.exe
Targets
-
-
Target
d066ad4ead3311db15867482abe1925b.exe
-
Size
656KB
-
MD5
d066ad4ead3311db15867482abe1925b
-
SHA1
c06c8c4aeed35c7d8a523bb9d489fbceca324dbc
-
SHA256
af8df57ba3941ed8fa89543e4e98f2da5dfe7a0efaaa72aaca4c54ea9f5ccc58
-
SHA512
c7f8cd55b69ada93dfd63f23e73636dc503e38545d9c7ee41563009c8879ce8e38f24b7de330e4891e745f0697c754d3d60befa3b23a1bc3d3cb3d2060101710
-
CryptBot Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Matrix
Collection
Data from Local System
3Command and Control
Credential Access
Credentials in Files
3Discovery
Query Registry
2Remote System Discovery
1System Information Discovery
2Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation