General

  • Target

    5827ebac03c822af895a1c0b45fbe4ef_JaffaCakes118

  • Size

    2.8MB

  • Sample

    241018-sqrhlswdqp

  • MD5

    5827ebac03c822af895a1c0b45fbe4ef

  • SHA1

    db3380a13fa112d61ca054ae944a2c5d325264a9

  • SHA256

    4218d74bd7fa7d4e9bd195faded956c30867041a2bc762ebe629e26008bfd5ac

  • SHA512

    01b75fb198199bb43b7005e2c9116678cf7a62c027629e9ab6ed2a599e3a3febec44e40850fd9c3bccb51453b95175678e38f0f35942135f7a0680bd68f13f51

  • SSDEEP

    49152:wB1AgCR97+twAWTbi5x6Gu5kYc+6J0l+DZVEq2axRb58rX0:wsgu97yw4g57nm9XEFKY

Malware Config

Extracted

Family

cryptbot

C2

pacbry45.top

mortiq04.top

Attributes
  • payload_url

    http://zukicv06.top/download.php?file=lv.exe

Targets

    • Target

      5827ebac03c822af895a1c0b45fbe4ef_JaffaCakes118

    • Size

      2.8MB

    • MD5

      5827ebac03c822af895a1c0b45fbe4ef

    • SHA1

      db3380a13fa112d61ca054ae944a2c5d325264a9

    • SHA256

      4218d74bd7fa7d4e9bd195faded956c30867041a2bc762ebe629e26008bfd5ac

    • SHA512

      01b75fb198199bb43b7005e2c9116678cf7a62c027629e9ab6ed2a599e3a3febec44e40850fd9c3bccb51453b95175678e38f0f35942135f7a0680bd68f13f51

    • SSDEEP

      49152:wB1AgCR97+twAWTbi5x6Gu5kYc+6J0l+DZVEq2axRb58rX0:wsgu97yw4g57nm9XEFKY

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks