General
-
Target
94ae98d3e8368e90f7777ee3df51da77.bin
-
Size
5.9MB
-
Sample
241120-y95r8stcmk
-
MD5
b554ebf1a0b48b9c432251f4fac3601e
-
SHA1
3447d54f76e916ac22db7071667f99da7695a0c4
-
SHA256
f780e06cf23d87e9373947e8460e89b422bafad1775cc148b4cb9fbae9d53293
-
SHA512
238851782d88f3d9b77355767c285630b9a1a352da43a20469210641200d638d3ee69f60344756dee93bf43c8d79c34ae8414bebacd6d00bb815c6aa49287533
-
SSDEEP
98304:VjaNW1DbcVRypfKtskiQvPbN+Ifpyc6F7pN/NCR2zMyjyLjNikP1o9GgkuQRo4JV:QNWtc/2fqJHbxPFADyL49xkuQN0+Uev
Static task
static1
Behavioral task
behavioral1
Sample
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe
Resource
win7-20240708-en
Malware Config
Extracted
cryptbot
http://ivyzhi22.top/gate.php
-
payload_url
http://womozi02.top/agnize.dat
Targets
-
-
Target
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe
-
Size
6.3MB
-
MD5
94ae98d3e8368e90f7777ee3df51da77
-
SHA1
513b8681ac6088324731af512cb44ea49d223d27
-
SHA256
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464
-
SHA512
945d77ed3e8aa250025b5d04ec60d06163c2556c0453d6c81af06031a1fd053c6cdc272bcfff71c0405375d669759b7e076122e490d5ad8c3fda7bfee9198f7c
-
SSDEEP
196608:BH6U57641LiUDQVnzWG/VsqUaJlReG73o:F5+7UDc9ZE
-
Cryptbot family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2