General

  • Target

    03da2ae13ce0c17673cba830097c5e31.exe

  • Size

    795KB

  • Sample

    230314-pjba9shc5z

  • MD5

    03da2ae13ce0c17673cba830097c5e31

  • SHA1

    9e9b477c0f210fa6ba2a7af34a973550c919f3b5

  • SHA256

    dcd4f454b507ad31ee21a15e49ef43675fddc60d0c0817bf965b27158cedbba0

  • SHA512

    731cb74ebf7156855c3d88f0f9acfce68fc94f122f949fde9e2f7b18229c60cf0e4fcd5d5c68266490ab319cd48e76f3cd7bbd495ebced433f4f896d1e4588fb

  • SSDEEP

    12288:RvJWWRVOBeE1MNDbtRdm0LkorMnzrSioSPfjnoHCvVXygIRltGBNKH:xsWRVDjN9fGorMn1os+Iru/eKH

Malware Config

Extracted

Family

cryptbot

C2

http://ernlen22.top/gate.php

Attributes
  • payload_url

    http://ovalim02.top/magpie.dat

Targets

    • Target

      03da2ae13ce0c17673cba830097c5e31.exe

    • Size

      795KB

    • MD5

      03da2ae13ce0c17673cba830097c5e31

    • SHA1

      9e9b477c0f210fa6ba2a7af34a973550c919f3b5

    • SHA256

      dcd4f454b507ad31ee21a15e49ef43675fddc60d0c0817bf965b27158cedbba0

    • SHA512

      731cb74ebf7156855c3d88f0f9acfce68fc94f122f949fde9e2f7b18229c60cf0e4fcd5d5c68266490ab319cd48e76f3cd7bbd495ebced433f4f896d1e4588fb

    • SSDEEP

      12288:RvJWWRVOBeE1MNDbtRdm0LkorMnzrSioSPfjnoHCvVXygIRltGBNKH:xsWRVDjN9fGorMn1os+Iru/eKH

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks