General

  • Target

    4d50f5e9e375f71ff3ac1e806c60a728.exe

  • Size

    2.6MB

  • Sample

    220226-j96l7sbddj

  • MD5

    4d50f5e9e375f71ff3ac1e806c60a728

  • SHA1

    76c1a682a7661810b8a608cc91c67bfdd15933b5

  • SHA256

    3678e658fdc8ef06809080bc210a3bce96157e1940fa9bd107759a448ff6b281

  • SHA512

    9c8f5c3b3273ee7c9eb42af195d9fad98c1b2bfc8ea592e8e5c147cae082bd0609a5f31e7257721f68494ed205a02b4227870cec4e6934fa7868d5eead0bb770

Malware Config

Extracted

Family

cryptbot

C2

briymk62.top



Targets

    • Target

      4d50f5e9e375f71ff3ac1e806c60a728.exe

    • Size

      2.6MB

    • MD5

      4d50f5e9e375f71ff3ac1e806c60a728

    • SHA1

      76c1a682a7661810b8a608cc91c67bfdd15933b5

    • SHA256

      3678e658fdc8ef06809080bc210a3bce96157e1940fa9bd107759a448ff6b281

    • SHA512

      9c8f5c3b3273ee7c9eb42af195d9fad98c1b2bfc8ea592e8e5c147cae082bd0609a5f31e7257721f68494ed205a02b4227870cec4e6934fa7868d5eead0bb770

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks