General

  • Target

    c7cdd3263f66f1399fb8334e6e3a5c87.exe

  • Size

    795KB

  • Sample

    230314-esae8afc9y

  • MD5

    c7cdd3263f66f1399fb8334e6e3a5c87

  • SHA1

    d82dbd4489672989f56c662bd39ef89cf4a4a1e7

  • SHA256

    842902a229af05a242d1c6a8db6ff66bd624a3326aa75c1600c13711eb029eb9

  • SHA512

    a435d277a7b6d6504c3be2e25644156723a7a3c34627a7298e825b5eb1d9fbf48ca31da7601e83cf9a6dfa977eb20d5af5b3f62fdaf3325e4242f3d7876e5d42

  • SSDEEP

    24576:gdoZ5Z9saIUk00C2ZHTjn080WgKy3SLUJFLH:gdoZ5ZYUk0K/080133qg7

Malware Config

Extracted

Family

cryptbot

C2

http://ernjxs12.top/gate.php

Attributes
  • payload_url

    http://ovaxlo01.top/chavez.dat

Targets

    • Target

      c7cdd3263f66f1399fb8334e6e3a5c87.exe

    • Size

      795KB

    • MD5

      c7cdd3263f66f1399fb8334e6e3a5c87

    • SHA1

      d82dbd4489672989f56c662bd39ef89cf4a4a1e7

    • SHA256

      842902a229af05a242d1c6a8db6ff66bd624a3326aa75c1600c13711eb029eb9

    • SHA512

      a435d277a7b6d6504c3be2e25644156723a7a3c34627a7298e825b5eb1d9fbf48ca31da7601e83cf9a6dfa977eb20d5af5b3f62fdaf3325e4242f3d7876e5d42

    • SSDEEP

      24576:gdoZ5Z9saIUk00C2ZHTjn080WgKy3SLUJFLH:gdoZ5ZYUk0K/080133qg7

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Tasks