General

  • Target

    file(4).exe

  • Size

    2.7MB

  • Sample

    220109-rkeq7aded8

  • MD5

    2145121fd426cf719e3b418108bb0215

  • SHA1

    256d36d145d164f7c97d667cc35592f27d6aa8ea

  • SHA256

    d36d4465c570673839d1139e66b284072a9d9f88ea7e2733c1751bd77e9afb2c

  • SHA512

    de0794d204e269f4b79cd42678b6c7493b94348f0388685c9759f3a762e5d8bf1d8f0eba5d3398e2d66975e98d4b7ae270c16f13d6034dcd8d7f029150765cc0

Malware Config

Extracted

Family

cryptbot

C2

zyodef72.top

morvue07.top

Attributes
  • payload_url

    http://yapkbc10.top/download.php?file=luzhou.exe

Targets

    • Target

      file(4).exe

    • Size

      2.7MB

    • MD5

      2145121fd426cf719e3b418108bb0215

    • SHA1

      256d36d145d164f7c97d667cc35592f27d6aa8ea

    • SHA256

      d36d4465c570673839d1139e66b284072a9d9f88ea7e2733c1751bd77e9afb2c

    • SHA512

      de0794d204e269f4b79cd42678b6c7493b94348f0388685c9759f3a762e5d8bf1d8f0eba5d3398e2d66975e98d4b7ae270c16f13d6034dcd8d7f029150765cc0

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks