General

  • Target

    eace6cd84265058817841921eb59d13a_JaffaCakes118

  • Size

    663KB

  • Sample

    240410-lzrfmsee9x

  • MD5

    eace6cd84265058817841921eb59d13a

  • SHA1

    f775412ce8d51fbce4d8b589a7bacb9470487daa

  • SHA256

    1c0e9c19952db42f2e8b9b8c158e1d761e1d58a548eda1b09984a510ed9c7541

  • SHA512

    105c9bdd3cbccd4c2b1b50f84e4322b7438d8896830157236c6276271528f89adafd8c71cc5645ce3829415e66e283ace9a37e844bb1ee0385f5c02716cc787f

  • SSDEEP

    12288:FgEZDdRJJSlTCRU2amM90djFPogwEl11SnuTCK8OiyZkx1bdi+S76q4tjjIy:FPQlTCRHdBPJ/Qn68OiyZiyR4tPIy

Malware Config

Extracted

Family

cryptbot

C2

ewaumk24.top

morzup02.top

Attributes
  • payload_url

    http://winqoz02.top/download.php?file=lv.exe

Targets

    • Target

      eace6cd84265058817841921eb59d13a_JaffaCakes118

    • Size

      663KB

    • MD5

      eace6cd84265058817841921eb59d13a

    • SHA1

      f775412ce8d51fbce4d8b589a7bacb9470487daa

    • SHA256

      1c0e9c19952db42f2e8b9b8c158e1d761e1d58a548eda1b09984a510ed9c7541

    • SHA512

      105c9bdd3cbccd4c2b1b50f84e4322b7438d8896830157236c6276271528f89adafd8c71cc5645ce3829415e66e283ace9a37e844bb1ee0385f5c02716cc787f

    • SSDEEP

      12288:FgEZDdRJJSlTCRU2amM90djFPogwEl11SnuTCK8OiyZkx1bdi+S76q4tjjIy:FPQlTCRHdBPJ/Qn68OiyZiyR4tPIy

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks