General

  • Target

    file.exe

  • Size

    623KB

  • Sample

    230416-v5xz2sag54

  • MD5

    3978c9186e82aeb44dadca6c7df4d2bd

  • SHA1

    146c49d206d64e3df8c9f623b481baf4f931352c

  • SHA256

    1f9f25a99544f9a1a83368c1d8fa08600a41863e61b39acf454a25ba2f74265b

  • SHA512

    d5b2fcee593beeaacd6b0c003b389c115941a30ea626faf096685662e83f2d489161f730d62e7b4414b56d951ab3bfdf33e99e762e57a3483bedbe3070feae91

  • SSDEEP

    12288:m2/EhMPvO9pWxfPpif8Qz0ZM/TS533iC4VwHBny040D8Asil14:m2/EhMPvOpWxfhif3/TU9ySI414

Malware Config

Extracted

Family

cryptbot

C2

http://ubykot72.top/gate.php

Attributes
  • payload_url

    http://moizyv10.top/odious.dat

Extracted

Family

cryptbot

C2

http://ubykot72.top/gate.php

Targets

    • Target

      file.exe

    • Size

      623KB

    • MD5

      3978c9186e82aeb44dadca6c7df4d2bd

    • SHA1

      146c49d206d64e3df8c9f623b481baf4f931352c

    • SHA256

      1f9f25a99544f9a1a83368c1d8fa08600a41863e61b39acf454a25ba2f74265b

    • SHA512

      d5b2fcee593beeaacd6b0c003b389c115941a30ea626faf096685662e83f2d489161f730d62e7b4414b56d951ab3bfdf33e99e762e57a3483bedbe3070feae91

    • SSDEEP

      12288:m2/EhMPvO9pWxfPpif8Qz0ZM/TS533iC4VwHBny040D8Asil14:m2/EhMPvOpWxfhif3/TU9ySI414

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks