General

  • Target

    JaffaCakes118_45a8020c7045422abe4ff5f0528aa3b48c331fc44d5a255b78fa6025c4a72631

  • Size

    4.6MB

  • Sample

    241226-tzhshazrbw

  • MD5

    75a8ca172f18a4921407a1600075a2c8

  • SHA1

    79677cb799860bd182f97ded4d27207504f094d6

  • SHA256

    45a8020c7045422abe4ff5f0528aa3b48c331fc44d5a255b78fa6025c4a72631

  • SHA512

    706e1e8e7b998a936e682743fd7e3fdfe0339be05f941ea884bf55643279fde804be2fbdd4ebeba73cf186b07740cd49eb57068a40cb7875d9829f79cbe12ef6

  • SSDEEP

    98304:B62mIloikgdWUgYiRqQ7JIkYq7hGbuQh61l48ZnIQvQVHCqQyLus3iHHlAe:k2mDindaYkt7JYy/Qh+28SQvQVVLusyZ

Malware Config

Extracted

Family

cryptbot

C2

befcpg15.top

morhid01.top

Targets

    • Target

      464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6

    • Size

      5.9MB

    • MD5

      ef74da6fc3a4b2704b76b67646ae0586

    • SHA1

      9edac158881bd29cbfd8928082cda81f4078c5f6

    • SHA256

      464f8fc360e64cdf07c837d5911f93b60cb99ee0ff531ffb0422652c7d6124d6

    • SHA512

      9726ed7a7b47b54a43b18967896375ffb058f650fb16b33087e17c7b8f670f1bd99d1bb9f693ae1dc16a3a7fa24e0ab751b733db574592fb48c567e97218ad2b

    • SSDEEP

      98304:8H7CgqLPRPYv7cZuwYx72XPo0+XB6zVqZj9jG6zqS99T+Hcxo6v14jm6/ZQmBy:c+gqLKB2pKcqR9KQqDHE7vejm6xQmBy

    • Babadeda

      Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

    • Babadeda Crypter

    • Babadeda family

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks