General
-
Target
JaffaCakes118_5af391be90cda339cdd429d328f31292dd1018dd6817da3a5d989c2641a7050b
-
Size
607KB
-
Sample
241222-gm4g8awnhs
-
MD5
13f6d764ef7691bb2fdf4bc9b0213f4e
-
SHA1
3458a8f8757273d5f52b98cb67d559bedfa3a6e4
-
SHA256
5af391be90cda339cdd429d328f31292dd1018dd6817da3a5d989c2641a7050b
-
SHA512
271daca72e3c9986cdd5119a474905556eebd68163f22b7aa0309d00344ac754d575f23ad406d5d77323e642985162229f16bffd0c6fdd45ac69a7b4987b92e2
-
SSDEEP
12288:7q1DJzKtnDmfFX9lPezta8z2k/eAcaAPXtGex1HdRol4JWexg+4gi:7qxJz+nDy/kVcaCtGEHdqlFvIi
Static task
static1
Behavioral task
behavioral1
Sample
a5c463db805e356cb6e73e5676b397eab265e061c6797e27b626b8b4aee892a3.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
remdvz22.top
morjgs02.top
-
payload_url
http://sulsxq03.top/download.php?file=lv.exe
Targets
-
-
Target
a5c463db805e356cb6e73e5676b397eab265e061c6797e27b626b8b4aee892a3.exe
-
Size
740KB
-
MD5
e458dc2ba9e161ea08ff8bebea2a469e
-
SHA1
33c3d82ad1a6ae6025f3c6d7230b7182da4b0765
-
SHA256
a5c463db805e356cb6e73e5676b397eab265e061c6797e27b626b8b4aee892a3
-
SHA512
f798ec39f39ecff88ed5092751e4500f4f7542e74d4b4c118b1dd85c390186d00b543aa9f26d6baf1317993bd7ee360177eb32b5c698d0356be3bbf1cb7d9eb1
-
SSDEEP
12288:0LbDQ1c1lf8x4vIN92yhfgO8B8dpSfWGklyqJ64Ocg8PZCpdnvkv5:0LXQ1c19e44jgN8dpWWGvw6zcdhIdnvo
-
CryptBot payload
-
Cryptbot family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-