General

  • Target

    7746ec6e55dc1957a3de5189bde4cdd4

  • Size

    392KB

  • Sample

    211205-mzjw8sfba9

  • MD5

    7746ec6e55dc1957a3de5189bde4cdd4

  • SHA1

    f6aeba8f808a16d05cb763389e2f8b40301cc45f

  • SHA256

    e72d6b4f1c18ed7ffe19bf0e029e0da687881e667a74b41f677ebc2dacc34d05

  • SHA512

    67e2bc366aac0b6cbe8085b9abb3266d9d09ec0583d0bd451511528421900b36b6bbb30f6d1ced29b1205369d9b55d41b03acc0e2be196ed6badae3acb5eb6a0

Malware Config

Extracted

Family

cryptbot

C2

unic15m.top

unic15e.top

Targets

    • Target

      7746ec6e55dc1957a3de5189bde4cdd4

    • Size

      392KB

    • MD5

      7746ec6e55dc1957a3de5189bde4cdd4

    • SHA1

      f6aeba8f808a16d05cb763389e2f8b40301cc45f

    • SHA256

      e72d6b4f1c18ed7ffe19bf0e029e0da687881e667a74b41f677ebc2dacc34d05

    • SHA512

      67e2bc366aac0b6cbe8085b9abb3266d9d09ec0583d0bd451511528421900b36b6bbb30f6d1ced29b1205369d9b55d41b03acc0e2be196ed6badae3acb5eb6a0

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks