General

  • Target

    61d4f24a3ecfb_Wed013b3d5d701.exe

  • Size

    2.7MB

  • Sample

    220105-eyzbjaabgp

  • MD5

    545067a0a51e1d310a2e2f4de09ec7ab

  • SHA1

    bfff58d02b443f551623d09fb958e681c2fb629d

  • SHA256

    abcacd5822584474d2ee44d7d89a7418d5be58a577118cded92d0f49eb31cbf1

  • SHA512

    c7df582f450594ddf2910533ae48b2e2b1affb17aa1082cff81eb4f5609545e89ed3367d41115ec8be29d4c0a65b707fd172eb3cf60928975b17bc4164299b38

Malware Config

Extracted

Family

cryptbot

C2

zyokao27.top

moreja02.top

Attributes
  • payload_url

    http://yaphsq02.top/download.php?file=cantey.exe

Targets

    • Target

      61d4f24a3ecfb_Wed013b3d5d701.exe

    • Size

      2.7MB

    • MD5

      545067a0a51e1d310a2e2f4de09ec7ab

    • SHA1

      bfff58d02b443f551623d09fb958e681c2fb629d

    • SHA256

      abcacd5822584474d2ee44d7d89a7418d5be58a577118cded92d0f49eb31cbf1

    • SHA512

      c7df582f450594ddf2910533ae48b2e2b1affb17aa1082cff81eb4f5609545e89ed3367d41115ec8be29d4c0a65b707fd172eb3cf60928975b17bc4164299b38

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks