Malware Analysis Report

2025-06-16 05:18

Sample ID 220127-v12sfahah2
Target bf51bc4bba9638f5411821d48ef31e7e478c28f3
SHA256 188d31cc6d4e4a75f41b6593331a92c5453bbb4c38b790b9a253f2a4c3e2048d
Tags
cryptbot discovery spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

188d31cc6d4e4a75f41b6593331a92c5453bbb4c38b790b9a253f2a4c3e2048d

Threat Level: Known bad

The file bf51bc4bba9638f5411821d48ef31e7e478c28f3 was found to be: Known bad.

Malicious Activity Summary

cryptbot discovery spyware stealer

CryptBot

Reads user/profile data of web browsers

Accesses cryptocurrency files/wallets, possible credential harvesting

Checks installed software on the system

Enumerates physical storage devices

Checks processor information in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-01-27 17:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-27 17:28

Reported

2022-01-27 17:30

Platform

win10-en-20211208

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bf51bc4bba9638f5411821d48ef31e7e478c28f3.exe"

Signatures

CryptBot

spyware stealer cryptbot

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Checks installed software on the system

discovery

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\bf51bc4bba9638f5411821d48ef31e7e478c28f3.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\bf51bc4bba9638f5411821d48ef31e7e478c28f3.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\bf51bc4bba9638f5411821d48ef31e7e478c28f3.exe

"C:\Users\Admin\AppData\Local\Temp\bf51bc4bba9638f5411821d48ef31e7e478c28f3.exe"

Network

Country Destination Domain Proto
US 52.109.12.18:443 tcp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp
US 8.8.8.8:53 gomvub75.top udp

Files

memory/2936-116-0x00000000001E0000-0x00000000001E1000-memory.dmp

memory/2936-115-0x0000000000400000-0x0000000000555000-memory.dmp

memory/2936-117-0x0000000002270000-0x00000000022B8000-memory.dmp