General
-
Target
JaffaCakes118_45a8020c7045422abe4ff5f0528aa3b48c331fc44d5a255b78fa6025c4a72631
-
Size
4.6MB
-
Sample
241226-tzhshazrbw
-
MD5
75a8ca172f18a4921407a1600075a2c8
-
SHA1
79677cb799860bd182f97ded4d27207504f094d6
-
SHA256
45a8020c7045422abe4ff5f0528aa3b48c331fc44d5a255b78fa6025c4a72631
-
SHA512
706e1e8e7b998a936e682743fd7e3fdfe0339be05f941ea884bf55643279fde804be2fbdd4ebeba73cf186b07740cd49eb57068a40cb7875d9829f79cbe12ef6
-
SSDEEP
98304:B62mIloikgdWUgYiRqQ7JIkYq7hGbuQh61l48ZnIQvQVHCqQyLus3iHHlAe:k2mDindaYkt7JYy/Qh+28SQvQVVLusyZ
Static task
static1
Behavioral task
behavioral1
Sample
464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6.exe
Resource
win7-20240729-en
Malware Config
Extracted
cryptbot
befcpg15.top
morhid01.top
Targets
-
-
Target
464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6
-
Size
5.9MB
-
MD5
ef74da6fc3a4b2704b76b67646ae0586
-
SHA1
9edac158881bd29cbfd8928082cda81f4078c5f6
-
SHA256
464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6
-
SHA512
9726ed7a7b47b54a43b18967896375ffb058f650fb16b33087e17c7b8f670f1bd99d1bb9f693ae1dc16a3a7fa24e0ab751b733db574592fb48c567e97218ad2b
-
SSDEEP
98304:8H7CgqLPRPYv7cZuwYx72XPo0+XB6zVqZj9jG6zqS99T+Hcxo6v14jm6/ZQmBy:c+gqLKB2pKcqR9KQqDHE7vejm6xQmBy
-
Babadeda Crypter
-
Babadeda family
-
Cryptbot family
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2