General

  • Target

    JaffaCakes118_d8f03daa4389b4e6ce37a3d3664e74f5

  • Size

    6.3MB

  • Sample

    250110-da81ds1rgq

  • MD5

    d8f03daa4389b4e6ce37a3d3664e74f5

  • SHA1

    9f044353923afec678d50777e8dc2e18a4b5ce21

  • SHA256

    d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6

  • SHA512

    4ea37e044be69b88c53f7bdecd0eb5c431fc3f112bd1cfd53942463756cd3187a3a5a2ead9a4ea82f6fc323213a17b9231d6ce9493f68cfe71aac250121a99f9

  • SSDEEP

    98304:+Pdx/6o/EJ6N6ExIxrnumYqN2nup/iRfigVs/DHDVhGBL341RTY9Wi6NuToaBOqj:+L6ocnTSR1eP4IFYLXToa8ta/9QH6Q9m

Malware Config

Extracted

Family

cryptbot

C2

veowvf15.top

morysl01.top

Attributes
  • payload_url

    http://tyngle01.top/download.php?file=lv.exe

Targets

    • Target

      JaffaCakes118_d8f03daa4389b4e6ce37a3d3664e74f5

    • Size

      6.3MB

    • MD5

      d8f03daa4389b4e6ce37a3d3664e74f5

    • SHA1

      9f044353923afec678d50777e8dc2e18a4b5ce21

    • SHA256

      d69e8d0678be5a8da741058f0ae2a6f99ffb8e3326ac50fda54336b23a546fc6

    • SHA512

      4ea37e044be69b88c53f7bdecd0eb5c431fc3f112bd1cfd53942463756cd3187a3a5a2ead9a4ea82f6fc323213a17b9231d6ce9493f68cfe71aac250121a99f9

    • SSDEEP

      98304:+Pdx/6o/EJ6N6ExIxrnumYqN2nup/iRfigVs/DHDVhGBL341RTY9Wi6NuToaBOqj:+L6ocnTSR1eP4IFYLXToa8ta/9QH6Q9m

    • Babadeda

      Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

    • Babadeda Crypter

    • Babadeda family

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks