General

  • Target

    d3bc73068c5c6a27f65ed15c6947a22afbe2acf555d43f87eae3e989c266c8c6.exe

  • Size

    6.3MB

  • Sample

    240915-bwn61aycrq

  • MD5

    95ed8ede15237d50ef5ac8340dee99e8

  • SHA1

    2a3b2c82ad878083a91d627f1ac355781ffa66a6

  • SHA256

    d3bc73068c5c6a27f65ed15c6947a22afbe2acf555d43f87eae3e989c266c8c6

  • SHA512

    ed2d514e11e7d535b637255f1e0b7cc7563d80b69d202dbf4bb9e08ea711e0cc0a5dadca7ba23d2269df04613150b1f49df92ae4059fd9803f5fa73160be6585

  • SSDEEP

    49152:T3Jep0EEHyrtZdVvVMi0HTlLRsfRb5qMsCeWYiey7oYFjyh4FwaqN049Y2d7w5i+:7Je50wDFqN0cZd7iJx0QVt56C2YT

Malware Config

Extracted

Family

cryptbot

C2

tventyvd20sb.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Targets

    • Target

      d3bc73068c5c6a27f65ed15c6947a22afbe2acf555d43f87eae3e989c266c8c6.exe

    • Size

      6.3MB

    • MD5

      95ed8ede15237d50ef5ac8340dee99e8

    • SHA1

      2a3b2c82ad878083a91d627f1ac355781ffa66a6

    • SHA256

      d3bc73068c5c6a27f65ed15c6947a22afbe2acf555d43f87eae3e989c266c8c6

    • SHA512

      ed2d514e11e7d535b637255f1e0b7cc7563d80b69d202dbf4bb9e08ea711e0cc0a5dadca7ba23d2269df04613150b1f49df92ae4059fd9803f5fa73160be6585

    • SSDEEP

      49152:T3Jep0EEHyrtZdVvVMi0HTlLRsfRb5qMsCeWYiey7oYFjyh4FwaqN049Y2d7w5i+:7Je50wDFqN0cZd7iJx0QVt56C2YT

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks