General

  • Target

    protochordate-archsee-3328.zip

  • Size

    2.8MB

  • Sample

    250208-tdd77avpam

  • MD5

    79be208973529d762d9d5c6067f42ea3

  • SHA1

    106529b03fc078a64ef65ddf53bc98fe949933d0

  • SHA256

    a1b292bb3f8ea1e913d58b7f58344582692f3142d3426f0d0e2eaa563318f945

  • SHA512

    f6858a1edd03291ced0dcc0e11cf19dea2b8be4d6c955ae9ca56e4b63e8017ee333565d4cfea04279268b3aebfcfeb9699d489ab27a211a6a620a950a5ac223d

  • SSDEEP

    49152:XI5CXNVKujWmRNkFnExstvn2zlWawVhk76Gt7ZniPmlvp2Rj/BaiHHffwrIqS84C:YYXNVKgkFnTtvk1wVgXBpl4jnnffwr5V

Malware Config

Extracted

Family

cryptbot

C2

http://home.thrtpp13sb.top/raOzktqqsOFBfTfWPzPd11

Targets

    • Target

      start-this-641.exe

    • Size

      9.2MB

    • MD5

      5e3f27e33382bfe00dff755de6419aac

    • SHA1

      12a9ffa0fb4610a1e2b8f5c06b8bb866b9a74467

    • SHA256

      ec0d356acab765845f3a575925bcf37bb123d9e31a7d715a40ab9a45c8ab9747

    • SHA512

      d9b461c18437950cbcfe9b37d90bff93b98c7842cfb5ec28af3a63b604f22751bd60d726df76abbd6b906bc60ce387972aa3057d2e1ac32666eb0c48e0577bc1

    • SSDEEP

      49152:hBh2PlCepkkx97IcHPcUclr4p5vcJffAdZXiwdZvuBWkhcscqqKlbrHPyz8AY/Fh:h7kwkxFH0UrbcVf6ZSwLu8VKVyz8D

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Enumerates VirtualBox registry keys

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks