General

  • Target

    JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0

  • Size

    2.9MB

  • Sample

    250106-vz78tssmht

  • MD5

    30a80093ffdd77cb26f2c7558846d5b0

  • SHA1

    8dd5e4b51d88e550033377ce26de0e136ee45a4e

  • SHA256

    381d92bbafee8c7a8e7b42ce2904812e5f652295eac97a262d7f1ad223eb5168

  • SHA512

    f152a76ea4d264b8a184ef9e741e413bef8f219a5f3e38f3be425b168b448fb264f86ff6f99eb766baec03053abb093e7f574983c14ab1d0b2baf76e28b1c69f

  • SSDEEP

    49152:D3+/DXxsNB1IS37mzt90YuKYJz1ZYHN5qIE8EBveV5dnVfp3HzI6+75BjvoujHp0:bvBJ37mx98RJot5bEBvK5JVNB+75BjvO

Malware Config

Extracted

Family

cryptbot

C2

veongt57.top

mornoi05.top

Attributes
  • payload_url

    http://tynqes07.top/download.php?file=zwoag.exe

Targets

    • Target

      JaffaCakes118_30a80093ffdd77cb26f2c7558846d5b0

    • Size

      2.9MB

    • MD5

      30a80093ffdd77cb26f2c7558846d5b0

    • SHA1

      8dd5e4b51d88e550033377ce26de0e136ee45a4e

    • SHA256

      381d92bbafee8c7a8e7b42ce2904812e5f652295eac97a262d7f1ad223eb5168

    • SHA512

      f152a76ea4d264b8a184ef9e741e413bef8f219a5f3e38f3be425b168b448fb264f86ff6f99eb766baec03053abb093e7f574983c14ab1d0b2baf76e28b1c69f

    • SSDEEP

      49152:D3+/DXxsNB1IS37mzt90YuKYJz1ZYHN5qIE8EBveV5dnVfp3HzI6+75BjvoujHp0:bvBJ37mx98RJot5bEBvK5JVNB+75BjvO

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks