General

  • Target

    91b8b5d888f9cb4655ac03d4553f690e

  • Size

    1.7MB

  • Sample

    231226-11zkzaebhk

  • MD5

    91b8b5d888f9cb4655ac03d4553f690e

  • SHA1

    aaeb196542db17b8f2526d0355a8b2b0649a0186

  • SHA256

    5261e9df15262227ac4ebc91643d13d5a9a56de89ab8916e7a3ae736cfa3cd3f

  • SHA512

    c72e33044ee35f996f7c7150b695be57021dba9031562a4650e2a9e56fc118a2bc899fd61aad0ab3797adadb6723d7a0fcb5285319c3868075dde892b18e178e

  • SSDEEP

    49152:YTT9nwPw0pSj2I70pqzrK90i/rci3lRT6z:Yv9wIMSPHK90i/rx1

Malware Config

Extracted

Family

cryptbot

C2

ewadgz11.top

morvay01.top

Attributes
  • payload_url

    http://winezo01.top/download.php?file=lv.exe

Targets

    • Target

      91b8b5d888f9cb4655ac03d4553f690e

    • Size

      1.7MB

    • MD5

      91b8b5d888f9cb4655ac03d4553f690e

    • SHA1

      aaeb196542db17b8f2526d0355a8b2b0649a0186

    • SHA256

      5261e9df15262227ac4ebc91643d13d5a9a56de89ab8916e7a3ae736cfa3cd3f

    • SHA512

      c72e33044ee35f996f7c7150b695be57021dba9031562a4650e2a9e56fc118a2bc899fd61aad0ab3797adadb6723d7a0fcb5285319c3868075dde892b18e178e

    • SSDEEP

      49152:YTT9nwPw0pSj2I70pqzrK90i/rci3lRT6z:Yv9wIMSPHK90i/rx1

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks