General
-
Target
Cryptded_protected.bin
-
Size
1.5MB
-
Sample
220711-pgln8aghgp
-
MD5
fc24752914e03759c7cc97e560154868
-
SHA1
9790816345ee7f10a0336f4013864c565c75de89
-
SHA256
a0de3c7f5026e72496e15c3fcb24947aa54e2d615bed91bc8f44fd07a2553b44
-
SHA512
7a7082c640fbcb54a9247848dde589258a7182ff2284c166372465f5d7a76ab3ce89cc7d98bba9fab3a670957655e8fb0337cd7f836cc1f88ccfe6aa980f904e
Static task
static1
Behavioral task
behavioral1
Sample
Cryptded_protected.exe
Resource
win7-20220414-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/963884131157168128/l7y0A3as75Se94o7XMk4zXPVahSSRfUXKz2j0cONgRgga6ZiO0oAtr3nqCmT9TlwHPnJ
Targets
-
-
Target
Cryptded_protected.bin
-
Size
1.5MB
-
MD5
fc24752914e03759c7cc97e560154868
-
SHA1
9790816345ee7f10a0336f4013864c565c75de89
-
SHA256
a0de3c7f5026e72496e15c3fcb24947aa54e2d615bed91bc8f44fd07a2553b44
-
SHA512
7a7082c640fbcb54a9247848dde589258a7182ff2284c166372465f5d7a76ab3ce89cc7d98bba9fab3a670957655e8fb0337cd7f836cc1f88ccfe6aa980f904e
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-