General

  • Target

    3bb78a6903d99f28dbdb09dbb4327aa60a1e697dd79a74a4b350e0984e5fcf8d.zip

  • Size

    4.3MB

  • Sample

    250211-yxme5ayqfz

  • MD5

    7f2338df6bb2b16431ef803621781449

  • SHA1

    c7708220ec71cc5c3f15eb930d9ddbe74db63e1e

  • SHA256

    d5e96c3d1eeb73aad47d9df1e88614ce143a345b5f116be0063fef20f22c83c9

  • SHA512

    1b35d239bd838e4ba97e0cd757c2a2a6fdf6c652d17c71bca0cd3e9c93e040d73f863d2eb76c1799319466439d19fcefd8cc3ec6435464be6862c8412308f8ca

  • SSDEEP

    98304:8IEserUOsLCztJvrVNRogZxWkGU6fqDEjdAMCy+sHD+Vp/:8FqLktJvrPugXzGUSqiATypj8/

Malware Config

Extracted

Family

cryptbot

C2

http://home.fivepp5sb.top/joLepLgSzIBRhlkJbQYx17

Targets

    • Target

      3bb78a6903d99f28dbdb09dbb4327aa60a1e697dd79a74a4b350e0984e5fcf8d.exe

    • Size

      6.3MB

    • MD5

      2149b9148cb557c34c21d866b501ac98

    • SHA1

      83df12db33d73c193a1df1056bbde38cc4f6d210

    • SHA256

      3bb78a6903d99f28dbdb09dbb4327aa60a1e697dd79a74a4b350e0984e5fcf8d

    • SHA512

      81f40561636b84cbb6be3329a63d542777123ba12912e1ad73a5fb1c4ef5d8a12ea6418d356c49da61a53b8682071c3bda49ee9c9aa324181cf5562a70264b4e

    • SSDEEP

      98304:Kxa1T8awJOxxbdOC3j1trIy9TI967Xtlkxp33GHG7bW0smSL:Ks1A5UxxBbj1trH9TI9n36WbW0

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks