General

  • Target

    50ccddcabb0d991d2a25c54cd9b2ef9fe83a568f8852c7791f77c8753d7d1c44.zip

  • Size

    1.7MB

  • Sample

    250326-arzlhavvh1

  • MD5

    3af3b4a5a266993364d69332dc84c812

  • SHA1

    282afde70a077ae72bc3fd6517e7eaee21de5927

  • SHA256

    50ccddcabb0d991d2a25c54cd9b2ef9fe83a568f8852c7791f77c8753d7d1c44

  • SHA512

    b7e3b32c37ab5c63f20119bedc16532edad21ba58fe2c4a34d5eff69d3ad7f5c4901af83a169943ca7d86cde01307c33f19ba1ff3d9264b563f2c62af91dd322

  • SSDEEP

    49152:857NjZf9Lvpl774uHqJvhG00+AnaRxYDLv7kNTqcwy47iRTpkP38:ElLzYbwna0vvgFeTit

Malware Config

Extracted

Family

cryptbot

C2

nkoopw11.top

moraass08.top

Targets

    • Target

      021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe

    • Size

      1.8MB

    • MD5

      d8a8599e2325010e356d1bf13395e0af

    • SHA1

      689a59ba3a0c4cfcbae7201cc09a986bc968b8f2

    • SHA256

      021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba

    • SHA512

      a56632b88a8b5e2bb938ee68a6a672650d2386ea18975b9d58156f2ad9efac5e4d6fa574e4c28a213cffd5c44c0355c5005e04b9801c92fe2ceef4a342e08799

    • SSDEEP

      49152:6sOXm4VF5ZCVpSm3/gjkl0+827d/GpncQ:6nxwDf3IjX27ocQ

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • CryptBot payload

    • Cryptbot family

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Deobfuscate/Decode Files or Information

      Payload decoded via CertUtil.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.