General

  • Target

    0c85f18e2d5f7d51f3f303e8f9a67fa08d80854ba40681ca0e06702a8ff358fb

  • Size

    2.7MB

  • Sample

    211230-n53f7sfha5

  • MD5

    ce471a3dce9d302fc7a9c7f571374566

  • SHA1

    a6fdd38318f1f6b22d7fa385895fa8fe487e11c6

  • SHA256

    0c85f18e2d5f7d51f3f303e8f9a67fa08d80854ba40681ca0e06702a8ff358fb

  • SHA512

    f3f75558e0d4ed78e5e05fe2fa95f6450173a21badbbf16d40f65bfadbdc766b875afec509411afd2436279ad6fca2b81f6284e317888f27037158c2ce2014e0

Malware Config

Extracted

Family

cryptbot

C2

hevtal42.top

morosf04.top

Attributes
  • payload_url

    http://kyrgvz05.top/download.php?file=kulmet.exe

Targets

    • Target

      0c85f18e2d5f7d51f3f303e8f9a67fa08d80854ba40681ca0e06702a8ff358fb

    • Size

      2.7MB

    • MD5

      ce471a3dce9d302fc7a9c7f571374566

    • SHA1

      a6fdd38318f1f6b22d7fa385895fa8fe487e11c6

    • SHA256

      0c85f18e2d5f7d51f3f303e8f9a67fa08d80854ba40681ca0e06702a8ff358fb

    • SHA512

      f3f75558e0d4ed78e5e05fe2fa95f6450173a21badbbf16d40f65bfadbdc766b875afec509411afd2436279ad6fca2b81f6284e317888f27037158c2ce2014e0

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks