General

  • Target

    975feaa8efd0fd8c5710652abc197e2c.exe

  • Size

    2.6MB

  • Sample

    220105-j7vrxsaden

  • MD5

    975feaa8efd0fd8c5710652abc197e2c

  • SHA1

    496a40eb59fed8322803c276fbd3cd1624f15e24

  • SHA256

    7ebd75f04be7424a2c2faa8be74538af662198fcd6c88bbeb4c99df4991ac06d

  • SHA512

    5390a8c3cf049a60610d101299f092ddfaf3e1856dff1b87643bfd6d17d2a7b8690b3cb898659e61d2752785ad3aae3e874aea670944e9ccf8846185b0525549

Malware Config

Extracted

Family

cryptbot

C2

zyobyd22.top

moreja02.top

Attributes
  • payload_url

    http://yaphsq02.top/download.php?file=cantey.exe

Targets

    • Target

      975feaa8efd0fd8c5710652abc197e2c.exe

    • Size

      2.6MB

    • MD5

      975feaa8efd0fd8c5710652abc197e2c

    • SHA1

      496a40eb59fed8322803c276fbd3cd1624f15e24

    • SHA256

      7ebd75f04be7424a2c2faa8be74538af662198fcd6c88bbeb4c99df4991ac06d

    • SHA512

      5390a8c3cf049a60610d101299f092ddfaf3e1856dff1b87643bfd6d17d2a7b8690b3cb898659e61d2752785ad3aae3e874aea670944e9ccf8846185b0525549

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

2
T1005

Tasks