General

  • Target

    19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a

  • Size

    6.3MB

  • Sample

    240929-yxxabsyarp

  • MD5

    94900e0695ddab53645fa9ca8d2ef416

  • SHA1

    f1c6ed26cee4f3a55b3f2a7382c2319791e4182d

  • SHA256

    19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a

  • SHA512

    118e077215b857f00abf805199cfc7777053e9bb542a3947e9d3047a8a27a8d09f344fd8ea62414b8ca65b35ece719bfdec2ccfd6f51eba356d341809670541c

  • SSDEEP

    49152:Tt3MuDOhzPKBq2GE+VK5M5mzotlVpEinKk0O6JYsG/rlWlwTCWpv67FNhezgRn6h:yE+VAi/rlW2Ggv67F/ezgNfUK2iSap0h

Malware Config

Extracted

Family

lumma

Extracted

Family

cryptbot

C2

forvh14pt.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Targets

    • Target

      19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a

    • Size

      6.3MB

    • MD5

      94900e0695ddab53645fa9ca8d2ef416

    • SHA1

      f1c6ed26cee4f3a55b3f2a7382c2319791e4182d

    • SHA256

      19c44dfde2dc255ed3f2ab9a9f7e48cced5bb0729965d10fb5db4f4235ac525a

    • SHA512

      118e077215b857f00abf805199cfc7777053e9bb542a3947e9d3047a8a27a8d09f344fd8ea62414b8ca65b35ece719bfdec2ccfd6f51eba356d341809670541c

    • SSDEEP

      49152:Tt3MuDOhzPKBq2GE+VK5M5mzotlVpEinKk0O6JYsG/rlWlwTCWpv67FNhezgRn6h:yE+VAi/rlW2Ggv67F/ezgNfUK2iSap0h

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks