General

  • Target

    KMSpico hackvshack.net.rar

  • Size

    6.6MB

  • Sample

    230304-xm664sea4t

  • MD5

    02fac15eeb1a668e3570e888fbb7d11a

  • SHA1

    4f8ed74f0294b9fb31332e9fd7b1116ffb0022c1

  • SHA256

    e003aafce833d0c78440f6fac3c4251e880a6883abeeb37b92cc507441e10531

  • SHA512

    da926d71331c096269188e9d7178c343f350983f5bf76a3febe35b4e5f4cfa66a19537b24ccf166abb43335d605d7a8d4fc155f90052efcf02bcf20f90b81a52

  • SSDEEP

    196608:AHIhM1N+NuPAjLXptTfieG5PNokzSPvlncXJIso:A33+bZtLg5FokYNcXJfo

Malware Config

Extracted

Family

cryptbot

C2

http://xjuwir54.top/gate.php

Targets

    • Target

      KMSpico/Files/Setup_KMS_Pico_Full_File.exe

    • Size

      6.8MB

    • MD5

      bab8700e9b4c73eae3b1f44c37cdbe51

    • SHA1

      556d004fdba6021bdd94abad27a52d4d47f4ded9

    • SHA256

      955d3d25d3b9aa6bd0945275e763bbb39d9c94c608d8edd3870281978e4a3ac9

    • SHA512

      e886739161a048637acdc21c01dae757bd7081683a3118afc08449c89ac4eccb0dfda56d201b006fd72665a57cd8e64f5ec7d3a2d2ba49a99c259e1d53375da5

    • SSDEEP

      196608:fpWJ+qDbY9GW37lta6+qJPRo/vRqId1g827kh:00qI9H7za6nJsJqIwgh

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Creates new service(s)

    • Sets file execution options in registry

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks