General

  • Target

    9605231b3632e8fd98ec70b4a1e1d2192689e4a4abc2df62c955c25e40bfe3e4

  • Size

    4MB

  • Sample

    220731-kr3chaghb3

  • MD5

    00f6d577255aeba6ef07654f829a945e

  • SHA1

    6a1983afed3140a083c2417c716d427ac9649e4e

  • SHA256

    9605231b3632e8fd98ec70b4a1e1d2192689e4a4abc2df62c955c25e40bfe3e4

  • SHA512

    e1d611b76c7a1b0ca10603cccb1c3f87abd05354e4a9d3e194586f56109202693607525fcc44ca639f778538422d4bef7c91b5e1b31986a7fc01e1abf51f6655

  • SSDEEP

    98304:wbNDO9MRv3n6wx02rPkC3St5fqiyUCQ0yUL05Rx:wZD1v3K1sSfX1iG

Malware Config

Extracted

Family

cryptbot

C2

hio01.pro

Targets

    • Target

      9605231b3632e8fd98ec70b4a1e1d2192689e4a4abc2df62c955c25e40bfe3e4

    • Size

      4MB

    • MD5

      00f6d577255aeba6ef07654f829a945e

    • SHA1

      6a1983afed3140a083c2417c716d427ac9649e4e

    • SHA256

      9605231b3632e8fd98ec70b4a1e1d2192689e4a4abc2df62c955c25e40bfe3e4

    • SHA512

      e1d611b76c7a1b0ca10603cccb1c3f87abd05354e4a9d3e194586f56109202693607525fcc44ca639f778538422d4bef7c91b5e1b31986a7fc01e1abf51f6655

    • SSDEEP

      98304:wbNDO9MRv3n6wx02rPkC3St5fqiyUCQ0yUL05Rx:wZD1v3K1sSfX1iG

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Command and Control

    Credential Access

    Execution

      Exfiltration

        Impact

          Initial Access

            Lateral Movement

              Persistence

                Privilege Escalation

                  Tasks