General
-
Target
979d1d97ef97c7ae5737a88e87757ec4
-
Size
750KB
-
Sample
240212-z1xwpsdh55
-
MD5
979d1d97ef97c7ae5737a88e87757ec4
-
SHA1
90d243cb67821975da1b13582476779eff5be9a5
-
SHA256
d6255b4b18e6f07c4708cf6344163dfe3197cf403957bf3085a6a737bb37b038
-
SHA512
05c60e3714d906ea985a923ebda9e2efca17dfe29bfe9169f8e14f7053dd2871d9fa6bafb1d56919c07041be8841cfba82811ac1868398e2587ca25433727b4f
-
SSDEEP
12288:7RC0TWlTuoyPO3DwWUhREG4HR7cOIiatuSgw8ibKmYjoCM0G3Pll93USBfC:vWlTuzWNOiarzYjoj0G/ll9o
Static task
static1
Behavioral task
behavioral1
Sample
979d1d97ef97c7ae5737a88e87757ec4.exe
Resource
win7-20231129-en
Malware Config
Extracted
cryptbot
smarew72.top
moriwi07.top
-
payload_url
http://guruzo10.top/download.php?file=lv.exe
Targets
-
-
Target
979d1d97ef97c7ae5737a88e87757ec4
-
Size
750KB
-
MD5
979d1d97ef97c7ae5737a88e87757ec4
-
SHA1
90d243cb67821975da1b13582476779eff5be9a5
-
SHA256
d6255b4b18e6f07c4708cf6344163dfe3197cf403957bf3085a6a737bb37b038
-
SHA512
05c60e3714d906ea985a923ebda9e2efca17dfe29bfe9169f8e14f7053dd2871d9fa6bafb1d56919c07041be8841cfba82811ac1868398e2587ca25433727b4f
-
SSDEEP
12288:7RC0TWlTuoyPO3DwWUhREG4HR7cOIiatuSgw8ibKmYjoCM0G3Pll93USBfC:vWlTuzWNOiarzYjoj0G/ll9o
-
CryptBot payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-