General
-
Target
9c9cb6d2d576ce60305c87aade6a2259c962ac94da96d83cf094c4d1ed0a856f.exe
-
Size
6.3MB
-
Sample
241124-kp7t7symcj
-
MD5
cddb1119c5429d9dacbd8bfc82ce14af
-
SHA1
833ad9c9378cae89fc23a136188a7073caf7573f
-
SHA256
9c9cb6d2d576ce60305c87aade6a2259c962ac94da96d83cf094c4d1ed0a856f
-
SHA512
9a2feff190c6794d1c56f5d2c56095fe3ef16c148f2916c251acd3f18c8db86fe5ace5c6dbe93db9276ab560352722560b769eec2a76cf2d031af36cd712f098
-
SSDEEP
98304:+Pdx/6o/EJ6N6ExIxrnumYqN2nup/iRfigVs/DHDVhGBL341RTY9Wi6NuToaBOqR:+L6ocnTSR1eP4IFYLXToa8ta/9QH6Q9S
Static task
static1
Behavioral task
behavioral1
Sample
9c9cb6d2d576ce60305c87aade6a2259c962ac94da96d83cf094c4d1ed0a856f.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
veowvf15.top
morysl01.top
-
payload_url
http://tyngle01.top/download.php?file=lv.exe
Targets
-
-
Target
9c9cb6d2d576ce60305c87aade6a2259c962ac94da96d83cf094c4d1ed0a856f.exe
-
Size
6.3MB
-
MD5
cddb1119c5429d9dacbd8bfc82ce14af
-
SHA1
833ad9c9378cae89fc23a136188a7073caf7573f
-
SHA256
9c9cb6d2d576ce60305c87aade6a2259c962ac94da96d83cf094c4d1ed0a856f
-
SHA512
9a2feff190c6794d1c56f5d2c56095fe3ef16c148f2916c251acd3f18c8db86fe5ace5c6dbe93db9276ab560352722560b769eec2a76cf2d031af36cd712f098
-
SSDEEP
98304:+Pdx/6o/EJ6N6ExIxrnumYqN2nup/iRfigVs/DHDVhGBL341RTY9Wi6NuToaBOqR:+L6ocnTSR1eP4IFYLXToa8ta/9QH6Q9S
-
Babadeda Crypter
-
Babadeda family
-
Cryptbot family
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2