General

  • Target

    JaffaCakes118_00c438725ecb2644ce59550ebe1d6ac1b6114e072b20e183b1de7274aec59137

  • Size

    5.1MB

  • Sample

    241222-f7r49awkfn

  • MD5

    53620c2e5b3f1dcb29e7ea360648cf10

  • SHA1

    373ead8807f35f5c870bbf8809832ae59f08c372

  • SHA256

    00c438725ecb2644ce59550ebe1d6ac1b6114e072b20e183b1de7274aec59137

  • SHA512

    65fe2f70b0a3e0b60febe237546970d374bfaf977baaf0ff0ce6e083d7a0c3f81dd38337da93f759092eff54eefa54a9625a516d5b58cf261c8a4960bd29a407

  • SSDEEP

    98304:nadccDy/BxLgFXeul9cr5v0S4zdlLZdlxiGp0Pkcf+BEPhoOGdo4CfpZVjPO:nyccD6Btqfl9cr5sSAD3lH0ZEFopfFPO

Malware Config

Extracted

Family

cryptbot

C2

befwid34.top

morvad03.top

Targets

    • Target

      49caac5d027dadb4db266ac999842ed7ea10b245750f8b31af738b4bfdcc5ade

    • Size

      6.4MB

    • MD5

      eafe390e9f0aa3df31fd0f41953a33ba

    • SHA1

      a87bf72ebe50064ad3115de3ecc602c1c2e6e923

    • SHA256

      49caac5d027dadb4db266ac999842ed7ea10b245750f8b31af738b4bfdcc5ade

    • SHA512

      7af3bc12a3ca904a7f16fae81fed24106d19df2895fe62fbca7fe1ee02df38f9b1a1509a486e5f1b289892a518ae771bdf282a9a0aa36a0177c77c12059108d2

    • SSDEEP

      196608:f+gqLKB2pwcfnhKCpIsLh+KlmB2VEIczIPKoVUg4Uf:f+jOB2pbfnhLqY+Klm0EIczID4i

    • Babadeda

      Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

    • Babadeda Crypter

    • Babadeda family

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks