General

  • Target

    JaffaCakes118_d01bb075012aa415c0d738a0018c980a

  • Size

    6.3MB

  • Sample

    250109-xwh6mszpgk

  • MD5

    d01bb075012aa415c0d738a0018c980a

  • SHA1

    450a53c9a1649466e6709cd456a5c5d748bc98f5

  • SHA256

    620ad7c3f04c41b7ffa56a369cc8c5b21034a37a3f4403e499147afbf1874b86

  • SHA512

    6c25f5bc67c564ad3013dd8606feb0edc4ff24e3efce7bec656639dadc58c0da5758569759b0cdf91c08cf63fcf61398417ae6156781c12f98183bf533d28bd0

  • SSDEEP

    98304:zPdx/6o/EJ6N6ExIxrnumYqR2EPsobf+do1otZpEfnt7bctTLyxa0VP+PAvLREUo:zL6ocnTrueMZMFcd+xpVQAvLREUxyKbC

Malware Config

Extracted

Family

cryptbot

C2

veoimd43.top

moruhx04.top

Attributes
  • payload_url

    http://tynauk05.top/download.php?file=lv.exe

Targets

    • Target

      JaffaCakes118_d01bb075012aa415c0d738a0018c980a

    • Size

      6.3MB

    • MD5

      d01bb075012aa415c0d738a0018c980a

    • SHA1

      450a53c9a1649466e6709cd456a5c5d748bc98f5

    • SHA256

      620ad7c3f04c41b7ffa56a369cc8c5b21034a37a3f4403e499147afbf1874b86

    • SHA512

      6c25f5bc67c564ad3013dd8606feb0edc4ff24e3efce7bec656639dadc58c0da5758569759b0cdf91c08cf63fcf61398417ae6156781c12f98183bf533d28bd0

    • SSDEEP

      98304:zPdx/6o/EJ6N6ExIxrnumYqR2EPsobf+do1otZpEfnt7bctTLyxa0VP+PAvLREUo:zL6ocnTrueMZMFcd+xpVQAvLREUxyKbC

    • Babadeda

      Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

    • Babadeda Crypter

    • Babadeda family

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks