General

  • Target

    Open_File__Setup__3456.exe

  • Size

    2.4MB

  • Sample

    220115-tmdysafbdj

  • MD5

    ce0635542db5e01faf2ad9e993b49f89

  • SHA1

    3d1cee7769e9007518645cfc42b8e010a6fa8dda

  • SHA256

    bf8ad824079b1874e69533189ff017da98a6547e0d88af78242208ed3690bd8d

  • SHA512

    9ec84c22a5c185aaf8c44f3ce9dd331c850de9661af2b700d0432f555e132e128e4b2a4afd4990569dafc199bc83268983ca4dc09a071ad80a129c5f49403fb9

Malware Config

Extracted

Family

cryptbot

C2

kotidu68.top

morzaq06.top

Attributes
  • payload_url

    http://okadoc09.top/download.php?file=makeyr.exe

Targets

    • Target

      Open_File__Setup__3456.exe

    • Size

      2.4MB

    • MD5

      ce0635542db5e01faf2ad9e993b49f89

    • SHA1

      3d1cee7769e9007518645cfc42b8e010a6fa8dda

    • SHA256

      bf8ad824079b1874e69533189ff017da98a6547e0d88af78242208ed3690bd8d

    • SHA512

      9ec84c22a5c185aaf8c44f3ce9dd331c850de9661af2b700d0432f555e132e128e4b2a4afd4990569dafc199bc83268983ca4dc09a071ad80a129c5f49403fb9

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Tasks