General

  • Target

    95ed8ede15237d50ef5ac8340dee99e8.bin

  • Size

    2.3MB

  • Sample

    240916-bqgjzasdpn

  • MD5

    63436df603202bb5d09c877e2d659b50

  • SHA1

    6a1dce82c15a885dcd97bb3d1fd0518dc75329c5

  • SHA256

    4ae317de8efc79461d690de6e2d453655f79a2e463647cfccc626208c862af8d

  • SHA512

    7c04259fedbaddd7ec0bfcdc59b01357ed0469fddbf0ba7e4dcee2b7461f6537807b367e7bd95d349121be9be76824d25429ad73eab73fa01b886944e1975594

  • SSDEEP

    49152:/BxVL6KpzY6hixRKxsGTkz/chiuiM5Tx6:/Bx0kY6ExqAz0hmQTw

Malware Config

Extracted

Family

cryptbot

C2

tventyvd20sb.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Targets

    • Target

      d3bc73068c5c6a27f65ed15c6947a22afbe2acf555d43f87eae3e989c266c8c6.exe

    • Size

      6.3MB

    • MD5

      95ed8ede15237d50ef5ac8340dee99e8

    • SHA1

      2a3b2c82ad878083a91d627f1ac355781ffa66a6

    • SHA256

      d3bc73068c5c6a27f65ed15c6947a22afbe2acf555d43f87eae3e989c266c8c6

    • SHA512

      ed2d514e11e7d535b637255f1e0b7cc7563d80b69d202dbf4bb9e08ea711e0cc0a5dadca7ba23d2269df04613150b1f49df92ae4059fd9803f5fa73160be6585

    • SSDEEP

      49152:T3Jep0EEHyrtZdVvVMi0HTlLRsfRb5qMsCeWYiey7oYFjyh4FwaqN049Y2d7w5i+:7Je50wDFqN0cZd7iJx0QVt56C2YT

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks