General

  • Target

    4022b529efa2d5cfea939732cab5f0829c1129809b7b6813bd1e80e7e9b14dc1

  • Size

    6.3MB

  • Sample

    240909-rbg5ys1hpq

  • MD5

    cb8527b1a92dc7eb211c0e78870def59

  • SHA1

    46d82d6504ba606102b43a42aba7f3ca8ef9cb96

  • SHA256

    4022b529efa2d5cfea939732cab5f0829c1129809b7b6813bd1e80e7e9b14dc1

  • SHA512

    bc2d291fbd1f1df5305a3da696353a2e93cf55157475ac34fb98d09cdbe8bf483adcdfa0f724f48e8c6db9212a96e15fa960f4b37fc36fe1b6079007da3fc4da

  • SSDEEP

    49152:JV43/hGZrWDav4GWgfLF9P0WHdqB9xZBxo/UVvq667qR44SDPsISUlGI2FJGP8Rw:x4GWOzPDHkB9DBxsJqSp4RI8a

Malware Config

Extracted

Family

cryptbot

C2

analforeverlovyu.top

tventyv20pn.top

Attributes
  • url_path

    /v1/upload.php

Targets

    • Target

      4022b529efa2d5cfea939732cab5f0829c1129809b7b6813bd1e80e7e9b14dc1

    • Size

      6.3MB

    • MD5

      cb8527b1a92dc7eb211c0e78870def59

    • SHA1

      46d82d6504ba606102b43a42aba7f3ca8ef9cb96

    • SHA256

      4022b529efa2d5cfea939732cab5f0829c1129809b7b6813bd1e80e7e9b14dc1

    • SHA512

      bc2d291fbd1f1df5305a3da696353a2e93cf55157475ac34fb98d09cdbe8bf483adcdfa0f724f48e8c6db9212a96e15fa960f4b37fc36fe1b6079007da3fc4da

    • SSDEEP

      49152:JV43/hGZrWDav4GWgfLF9P0WHdqB9xZBxo/UVvq667qR44SDPsISUlGI2FJGP8Rw:x4GWOzPDHkB9DBxsJqSp4RI8a

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks