Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe
Resource
win7-20240903-en
General
-
Target
6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe
-
Size
361KB
-
MD5
724e8026fcd687cbd7808408ffbdd3ab
-
SHA1
d9243d3b0aa7a8d6b58b7f6f7065c9e55d4fcb34
-
SHA256
6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a
-
SHA512
28b183e5b55f2e6d57d33b571119400f149910077156b5ecd46cef95b6b6ec1e449bba05f4e2a61948d2ea55b667982e0b8a7e2f339ef7c7ac1f34fe437fc6a3
-
SSDEEP
6144:haYcHyGtkpjwwj9azy/DcWWrktaxJwPR3:gTHXt279+y/DcWWrFxJM
Malware Config
Extracted
cryptbot
befyum42.top
morkoe04.top
-
payload_url
http://mindoi05.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe"C:\Users\Admin\AppData\Local\Temp\6dbc5053ef73f361771e017473f9d53b9df951cc9e0f1d31e1218033160f2b5a.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5285415e2ffacec6846da3cd5e214e400
SHA1d23a6da2b79e9474b5df774812d23843cfc526f5
SHA2563a2162179b2a59e6eb3ce3d0bdf620e21389d71aa0f01dcf7cf87549248290d8
SHA512bae639083fe7c6676d517bfe3746799209a0ee3017f12b237ffe7fd4459835fa25da430f91b07dd60004e244686b0081ae55716bdb0ec83a7b6fd784149971eb
-
Filesize
7KB
MD59b5e19189756b2359f05c826abab260e
SHA1654c0c22b47821c53d4aa072d7eae2dec08afdaa
SHA256a4b107378068010b85eb5f0df6278e5b62a965c96a30a40ee27af7ce36ef030e
SHA512b93cbfca2cf6e25484fbb5ac69ca6e768fc32e4cb2dd3e7c0f28436fc1359d29f3f8f532f128d1c67a978fb19400b7cbcdafe2dfc9a99bf3a5d9172ed9e1913b
-
Filesize
54KB
MD5b622f427b34ea4580672a199b577dd08
SHA1536f4ce290b1faa94c0ef94dd9721b98fbdb7adc
SHA256743f389d3206f521bf42825a98ab5b3b3cfd20f5d2ab670b2cba33af50659db9
SHA51204937ca7dbbb62ce8378913234f420426eacc7d5a92b9d2669d0b4f9e37a2fd89f0e7441cf5df84d3e6fe7850d3be3decee9ec518cbeb333282243f54771b45f