General

  • Target

    05e14cea2c46626a6cd43853ee1c0d73

  • Size

    795KB

  • Sample

    230314-gc4egafg7y

  • MD5

    05e14cea2c46626a6cd43853ee1c0d73

  • SHA1

    da7bb1a996ab6bc87167cda11bd7f135fbb798a9

  • SHA256

    4af79018e162a331be3bea41ad6b7e5c17bb0d3d24e1b25abf0b11382bf36072

  • SHA512

    693a114171d4e12cf5895b0789b7d594566fce44c9dd8d6ed294cbcc944d7823c9608706a7aba5cb841efe36fb7e07523a7ce7b1370a936f9fe0ca0ca6a87237

  • SSDEEP

    24576:nfR71zCvirJFC8u8G4TYsSgMzAJTGwWWTtH:nfR71zCvi9FC8u8G4cspAcT9t

Malware Config

Extracted

Family

cryptbot

C2

http://ernjxs12.top/gate.php

Attributes
  • payload_url

    http://ovaxlo01.top/chavez.dat

Targets

    • Target

      05e14cea2c46626a6cd43853ee1c0d73

    • Size

      795KB

    • MD5

      05e14cea2c46626a6cd43853ee1c0d73

    • SHA1

      da7bb1a996ab6bc87167cda11bd7f135fbb798a9

    • SHA256

      4af79018e162a331be3bea41ad6b7e5c17bb0d3d24e1b25abf0b11382bf36072

    • SHA512

      693a114171d4e12cf5895b0789b7d594566fce44c9dd8d6ed294cbcc944d7823c9608706a7aba5cb841efe36fb7e07523a7ce7b1370a936f9fe0ca0ca6a87237

    • SSDEEP

      24576:nfR71zCvirJFC8u8G4TYsSgMzAJTGwWWTtH:nfR71zCvi9FC8u8G4cspAcT9t

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

6
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Tasks