Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 21:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
47725225f66768fbf51d112c9deb1100N.exe
Resource
win7-20240903-en
2 signatures
120 seconds
General
-
Target
47725225f66768fbf51d112c9deb1100N.exe
-
Size
6.3MB
-
MD5
47725225f66768fbf51d112c9deb1100
-
SHA1
e50eb314ddb81f23870f9262f8aa912735e04c67
-
SHA256
9b6ea4ca27dbeb9e83f9a4324b002eaff9b9c9d008ca8619aafab0b600c8c025
-
SHA512
43a078f534bb1de61a1179a100556e7a6bd41002cb984c6bace4735189b753186857cfe6d6313b28ea000e731ad5d5d8ae61b3c1e747c6c76dfa939f5b8c4bd9
-
SSDEEP
98304:W0/exNNQ6/A5los7OLmhBvmPKUTaHorY/FOjaJM+ZaMAUMfq+iyw:R2Q35UT0vtLXFr+iyw
Malware Config
Extracted
Family
cryptbot
C2
analforeverlovyu.top
tventyv20sb.top
Attributes
-
url_path
/v1/upload.php
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47725225f66768fbf51d112c9deb1100N.exe