General

  • Target

    12122b4d9d95f1e79e281c2f2301ebd87575310596efca1814de99757ffbb769

  • Size

    2.9MB

  • Sample

    220213-j97t9sfgh4

  • MD5

    0116213369363ddd6dbe7c5406600720

  • SHA1

    8419d0895e4bb4721a3ceea2ccc2fd65b56bf796

  • SHA256

    12122b4d9d95f1e79e281c2f2301ebd87575310596efca1814de99757ffbb769

  • SHA512

    cfa8a66fb2e31b9aa616ab961425ebcc9d96cd11b664671e6de0714614f57eafd95b183ca372e6fa566c4733db938d0ff7b14f0feab5e1d7b1a13b71980585e6

Malware Config

Targets

    • Target

      12122b4d9d95f1e79e281c2f2301ebd87575310596efca1814de99757ffbb769

    • Size

      2.9MB

    • MD5

      0116213369363ddd6dbe7c5406600720

    • SHA1

      8419d0895e4bb4721a3ceea2ccc2fd65b56bf796

    • SHA256

      12122b4d9d95f1e79e281c2f2301ebd87575310596efca1814de99757ffbb769

    • SHA512

      cfa8a66fb2e31b9aa616ab961425ebcc9d96cd11b664671e6de0714614f57eafd95b183ca372e6fa566c4733db938d0ff7b14f0feab5e1d7b1a13b71980585e6

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks