General
-
Target
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617
-
Size
8.5MB
-
Sample
240916-nnt4havfrj
-
MD5
a9a36a8aed8eb3d7e2e6cf408ec6419c
-
SHA1
5a149503bdc2ef6af39b926ce67a65e1cd1ce912
-
SHA256
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617
-
SHA512
a77c3f2e1d7e61ceb2a60d73742a3bc3a448f09b9994e67abfe5fcd582b48589017719a38c4deef1351becdd844ff9cca2ddda45a29ff9ffa95394c903e8a596
-
SSDEEP
196608:cm+wIFMhaDN3lXzh9caTDv7Q4rwfmEjk2gunMnoZbM:L+7GhWpzjAgsTjpqnCQ
Static task
static1
Behavioral task
behavioral1
Sample
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
cryptbot
forcj4vs.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Targets
-
-
Target
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617
-
Size
8.5MB
-
MD5
a9a36a8aed8eb3d7e2e6cf408ec6419c
-
SHA1
5a149503bdc2ef6af39b926ce67a65e1cd1ce912
-
SHA256
0304eaf2449482a824044e66a3891e198ce5e60cedad6cc2c9df9183c8f3e617
-
SHA512
a77c3f2e1d7e61ceb2a60d73742a3bc3a448f09b9994e67abfe5fcd582b48589017719a38c4deef1351becdd844ff9cca2ddda45a29ff9ffa95394c903e8a596
-
SSDEEP
196608:cm+wIFMhaDN3lXzh9caTDv7Q4rwfmEjk2gunMnoZbM:L+7GhWpzjAgsTjpqnCQ
Score10/10-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-