General

  • Target

    dd2cb882d1c389c64e7648022451ddb335279ffe4564bafa932cc673273ebd29

  • Size

    2.7MB

  • Sample

    220105-yb29fsafd2

  • MD5

    a5aafab67dfcad2fae7b85c7bcccbb5d

  • SHA1

    59cb807951956f1c62e4cfb355d5529de0ca729e

  • SHA256

    dd2cb882d1c389c64e7648022451ddb335279ffe4564bafa932cc673273ebd29

  • SHA512

    f21a00af7021f137e6336e4a9597239ecfb57ce77dd6888a3215e282de0b53b2690456e0e471a7a65339ef397767a27f762b5ad2f4a6f4356ef04ff809f3af3e

Malware Config

Extracted

Family

cryptbot

C2

zyonwd32.top

morynt03.top

Attributes
  • payload_url

    http://yapstn04.top/download.php?file=daladi.exe

Targets

    • Target

      dd2cb882d1c389c64e7648022451ddb335279ffe4564bafa932cc673273ebd29

    • Size

      2.7MB

    • MD5

      a5aafab67dfcad2fae7b85c7bcccbb5d

    • SHA1

      59cb807951956f1c62e4cfb355d5529de0ca729e

    • SHA256

      dd2cb882d1c389c64e7648022451ddb335279ffe4564bafa932cc673273ebd29

    • SHA512

      f21a00af7021f137e6336e4a9597239ecfb57ce77dd6888a3215e282de0b53b2690456e0e471a7a65339ef397767a27f762b5ad2f4a6f4356ef04ff809f3af3e

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks