General
-
Target
d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2
-
Size
5.7MB
-
Sample
220119-t229xsbecl
-
MD5
998dd3d8897f2c619d9e5975f7aeed7e
-
SHA1
817745be0e42515167e1650b77630b7b34c4e8ab
-
SHA256
d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2
-
SHA512
cdb8fc0e08007911bcf5d51af6cafc4773ec10df8cf91f9c132d36c23dbee1fac563651f9cdf4513a01fdb4d95cf26d4695944e1eda3067dee4d4b9c04cc25bd
Static task
static1
Behavioral task
behavioral1
Sample
d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2.exe
Resource
win7-en-20211208
Malware Config
Extracted
cryptbot
cemeif67.top
morota06.top
-
payload_url
http://bojitn09.top/download.php?file=lv.exe
Targets
-
-
Target
d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2
-
Size
5.7MB
-
MD5
998dd3d8897f2c619d9e5975f7aeed7e
-
SHA1
817745be0e42515167e1650b77630b7b34c4e8ab
-
SHA256
d2fc2159debd0a2222673cdc028c5f88ca5cc6c72f5665d60c5d27806757cff2
-
SHA512
cdb8fc0e08007911bcf5d51af6cafc4773ec10df8cf91f9c132d36c23dbee1fac563651f9cdf4513a01fdb4d95cf26d4695944e1eda3067dee4d4b9c04cc25bd
-
Babadeda Crypter
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-