General
-
Target
25f76360a7087dd84e502d4c8750fe01aff8ffde6d0a81470d3a0d6d7e71b583
-
Size
6.0MB
-
Sample
220611-vy5rbahebm
-
MD5
84ceb7611c268b146297434e96959690
-
SHA1
53fa7adb8a69983273ac80756a8ed1548b77be74
-
SHA256
25f76360a7087dd84e502d4c8750fe01aff8ffde6d0a81470d3a0d6d7e71b583
-
SHA512
d6c8f2b1c2269f43792ea3671e6d51bc3d8a8d1dcf8a11c89eb6b96f4d361603c02404da0a4e8dacf7a4c9b07c7db3feebb198aba3c2dc1600a8d37f11638711
Static task
static1
Behavioral task
behavioral1
Sample
25f76360a7087dd84e502d4c8750fe01aff8ffde6d0a81470d3a0d6d7e71b583.exe
Resource
win7-20220414-en
Malware Config
Extracted
cryptbot
cemawp63.top
morota06.top
-
payload_url
http://bojitn09.top/download.php?file=lv.exe
Targets
-
-
Target
25f76360a7087dd84e502d4c8750fe01aff8ffde6d0a81470d3a0d6d7e71b583
-
Size
6.0MB
-
MD5
84ceb7611c268b146297434e96959690
-
SHA1
53fa7adb8a69983273ac80756a8ed1548b77be74
-
SHA256
25f76360a7087dd84e502d4c8750fe01aff8ffde6d0a81470d3a0d6d7e71b583
-
SHA512
d6c8f2b1c2269f43792ea3671e6d51bc3d8a8d1dcf8a11c89eb6b96f4d361603c02404da0a4e8dacf7a4c9b07c7db3feebb198aba3c2dc1600a8d37f11638711
-
Babadeda Crypter
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-