General

  • Target

    b976eb61942f5feb72dd43d6b16f0c8f

  • Size

    1.4MB

  • Sample

    240307-xztrjsce8z

  • MD5

    b976eb61942f5feb72dd43d6b16f0c8f

  • SHA1

    ad11dd9fdca6c72328acb45569a2c97c24188043

  • SHA256

    953f9761acd7d9a2b093225fe0b4131b85696ecd0d6fad1d504173a90829be0d

  • SHA512

    5ce9d29e6956aed0b0b9f390a9df816c00ea0d5cce91af08b246b64a3ccb15c554cd7c98c2bef544282bfb0f9d547b9f1a7681d77fe62d13d943e491f06957f7

  • SSDEEP

    24576:11SwsUHmbqGRGOxrYZd23bTDdRc7GFXy9AoXzhfD1mHN9LOVA:xsUGbqGRFyd2L/dRc7GBy9AM98HbyV

Malware Config

Extracted

Family

cryptbot

C2

knufnp41.top

morumd04.top

Attributes
  • payload_url

    http://sarfri06.top/download.php?file=lv.exe

Targets

    • Target

      b976eb61942f5feb72dd43d6b16f0c8f

    • Size

      1.4MB

    • MD5

      b976eb61942f5feb72dd43d6b16f0c8f

    • SHA1

      ad11dd9fdca6c72328acb45569a2c97c24188043

    • SHA256

      953f9761acd7d9a2b093225fe0b4131b85696ecd0d6fad1d504173a90829be0d

    • SHA512

      5ce9d29e6956aed0b0b9f390a9df816c00ea0d5cce91af08b246b64a3ccb15c554cd7c98c2bef544282bfb0f9d547b9f1a7681d77fe62d13d943e491f06957f7

    • SSDEEP

      24576:11SwsUHmbqGRGOxrYZd23bTDdRc7GFXy9AoXzhfD1mHN9LOVA:xsUGbqGRFyd2L/dRc7GBy9AM98HbyV

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks