General

  • Target

    b1f9e7c1abace4cf8442f9d5b867c6ad9bf1fce804e068acf3a5a0854f4e4edf

  • Size

    428KB

  • Sample

    211022-skza9scfgl

  • MD5

    6f56173d5ef673d5d124f621e3fb3c18

  • SHA1

    69dc2e05c048c219b807dc6f5596c508fbb03b0c

  • SHA256

    b1f9e7c1abace4cf8442f9d5b867c6ad9bf1fce804e068acf3a5a0854f4e4edf

  • SHA512

    9c457471a21e712f62e6e53697cc0c114d8a70df2fcd5ccda06a61774667dd2c6c95dc0cc96951c3ca84583f4d663f0035b1b0384292e50857729e49ca3b9119

Malware Config

Extracted

Family

cryptbot

C2

veogmc52.top

mornoi05.top

Attributes
  • payload_url

    http://tynwyl15.top/download.php?file=penwa.exe

Targets

    • Target

      b1f9e7c1abace4cf8442f9d5b867c6ad9bf1fce804e068acf3a5a0854f4e4edf

    • Size

      428KB

    • MD5

      6f56173d5ef673d5d124f621e3fb3c18

    • SHA1

      69dc2e05c048c219b807dc6f5596c508fbb03b0c

    • SHA256

      b1f9e7c1abace4cf8442f9d5b867c6ad9bf1fce804e068acf3a5a0854f4e4edf

    • SHA512

      9c457471a21e712f62e6e53697cc0c114d8a70df2fcd5ccda06a61774667dd2c6c95dc0cc96951c3ca84583f4d663f0035b1b0384292e50857729e49ca3b9119

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks