General

  • Target

    ed56b96ba7248e74fdf1ded506d26d5d.exe

  • Size

    2.7MB

  • Sample

    220110-lh8ctseag3

  • MD5

    ed56b96ba7248e74fdf1ded506d26d5d

  • SHA1

    7724847f44b97aa80e91abffa364f9883dbd5053

  • SHA256

    0b1e6c22216f23b8d4f81abb82333dd65ed64929e14cec83985d11a4d84cea9c

  • SHA512

    9968f2199b2f22334d3e6e66a325cc92c9b363474b4d5c422f20761148957fffe7e5aa09acecf32ccb679f8ba45b9d1fde283e32f027e518a95f2d30f7a6ca74

Malware Config

Extracted

Family

cryptbot

C2

zyodef72.top

morvue07.top

Attributes
  • payload_url

    http://yapkbc10.top/download.php?file=luzhou.exe

Targets

    • Target

      ed56b96ba7248e74fdf1ded506d26d5d.exe

    • Size

      2.7MB

    • MD5

      ed56b96ba7248e74fdf1ded506d26d5d

    • SHA1

      7724847f44b97aa80e91abffa364f9883dbd5053

    • SHA256

      0b1e6c22216f23b8d4f81abb82333dd65ed64929e14cec83985d11a4d84cea9c

    • SHA512

      9968f2199b2f22334d3e6e66a325cc92c9b363474b4d5c422f20761148957fffe7e5aa09acecf32ccb679f8ba45b9d1fde283e32f027e518a95f2d30f7a6ca74

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

2
T1005

Tasks