General

  • Target

    43a8636f8748675fb63d026bae9c73b3.bin

  • Size

    5.1MB

  • Sample

    240123-bmp2yaeeer

  • MD5

    c3f7c68dd2b2616f15ded5eae0a08451

  • SHA1

    73f84b3442782ad29f8d2201ae744dcc70769478

  • SHA256

    4dfb1deeb72088bbc9d755078e69970b1e8c445f92d0329d415ab2a65a45a205

  • SHA512

    ab1c86cc450847ffef9bd51875aede9d2e216a2b8e3b1b0f41b052d88358ade454d45a792363fdefa840d8b0a4ec37859b1d2e7c5e5b2b4811ad4d4abe9acdfc

  • SSDEEP

    98304:ek9+WzlLITn+vMcej9rTbyqJeyH5Y4x37fUbqCirpQ2yZJc+mU+UC0TZXXE:H0QNKWMPrTbnJT7IqRrQZd3+aTq

Malware Config

Extracted

Family

cryptbot

C2

http://fygbib44.top/gate.php

Targets

    • Target

      24fca3cd8aad055b2284fdf5c0cd73642b88bb19de7c3137361e46529da5b67f.exe

    • Size

      7.5MB

    • MD5

      43a8636f8748675fb63d026bae9c73b3

    • SHA1

      e9f2c0a7e105fe35d3bf72b2cd014d32476e0780

    • SHA256

      24fca3cd8aad055b2284fdf5c0cd73642b88bb19de7c3137361e46529da5b67f

    • SHA512

      77bfff59dfa5cff7b66f940e827964635842a5e1ca683ace0af8831e3718f1f542aa5be2628357fa66b7929ad2d0f8fc4b03ede3602a429aef0dfc64e9f8309c

    • SSDEEP

      98304:nVEhTEPMnmpIOHOdMJ7/nATC4K7XsWkkjaHjTo82Pb0cM:nKqPo5MJzATC4C8Wfsj

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks