Resubmissions

06-03-2023 15:37

230306-s2rbzsda88 10

06-03-2023 15:31

230306-syfq3scd9z 10

General

  • Target

    Setup_KMS_Pico_Full_File.exe

  • Size

    6.9MB

  • Sample

    230306-s2rbzsda88

  • MD5

    bc871f81f03e0e7fbf4fdf282628fb54

  • SHA1

    1de156ee2a0290d92ef9b251310aa98cce9cf48c

  • SHA256

    ec88dbbcd5cc0671007964874b399d01f078cdcb0e6bbd3c7ffd1c674d351831

  • SHA512

    d97e73c58cd847aa60bb797ed77cacc3d61e7f5647af74f8dc62043bf1a30ff03416fde4ad80053835639a5d53bfe1198865129c7eb18440829db642c7f147cc

  • SSDEEP

    98304:obEsP0kouyk3xKupPeci/G5KvCTes5amjKM+MJxUDKx1GT5myN+dObrDTUxv:oTskop0zPf3njv+c31GlpN+Ufev

Malware Config

Extracted

Family

cryptbot

C2

http://lahuwf14.top/gate.php

Targets

    • Target

      Setup_KMS_Pico_Full_File.exe

    • Size

      6.9MB

    • MD5

      bc871f81f03e0e7fbf4fdf282628fb54

    • SHA1

      1de156ee2a0290d92ef9b251310aa98cce9cf48c

    • SHA256

      ec88dbbcd5cc0671007964874b399d01f078cdcb0e6bbd3c7ffd1c674d351831

    • SHA512

      d97e73c58cd847aa60bb797ed77cacc3d61e7f5647af74f8dc62043bf1a30ff03416fde4ad80053835639a5d53bfe1198865129c7eb18440829db642c7f147cc

    • SSDEEP

      98304:obEsP0kouyk3xKupPeci/G5KvCTes5amjKM+MJxUDKx1GT5myN+dObrDTUxv:oTskop0zPf3njv+c31GlpN+Ufev

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Creates new service(s)

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks