Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 07:00

General

  • Target

    131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe

  • Size

    305KB

  • MD5

    4309f4b4bb455f998d1fdf310cd83484

  • SHA1

    4ee10072d4dff28efcd64d8dcd631760868d644b

  • SHA256

    131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1

  • SHA512

    3d730ec6e3b385a69fa62634f4776e98327bc8f5da6330b109d3de5b37339dcb97cf9bf489c548de23f6ff71b115e921d5179cf2606eba61783851462ba807bf

  • SSDEEP

    6144:zWmk/wokUNpuDoAVUx99rpABXHxjdgwJids6m+8suhyiP:NswuNpQv299rpAVHxJgw0dsp+dTiP

Malware Config

Extracted

Family

cryptbot

C2

befqlo52.top

mortos05.top

Attributes
  • payload_url

    http://mincir07.top/download.php?file=lv.exe

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe
    "C:\Users\Admin\AppData\Local\Temp\131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    PID:3808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\xfyTQBQTE\UsYIHulXpDQ.zip

    Filesize

    50KB

    MD5

    e30e3072d60e0bf9b06ee0eea756f583

    SHA1

    04a0acd7d0007ecb1df30952937993b9aa6660d5

    SHA256

    096b598c3436b0cae479fae5758365e54350d604374e23e20c8ab39145392356

    SHA512

    646aafc30747e27055f71bd99a35c902bd110d14fa1dd538761df7bff95c97528bc11d1ad8bd33bb20d9cfd7522c0d34ca2c5f7d4e52cdc3878ae09134936f90

  • C:\Users\Admin\AppData\Local\Temp\xfyTQBQTE\_Files\_Information.txt

    Filesize

    2KB

    MD5

    4096e5d8ff73b06c01c040880de160c7

    SHA1

    d276b490c7852b674e8fec127bdadd0cbb7e2497

    SHA256

    5011058c2c2eacba429cf3d39ac0a0049cc4d4b6e006e48c1732fad5db58208f

    SHA512

    70d08892cb1df62869f6f3e8283866abd1120a7bd1b39b84bba9f495c814e51038e46bea5cdc2994daf6a3911cadb2f9adf38a4531fb877d4ad54092c23e1013

  • C:\Users\Admin\AppData\Local\Temp\xfyTQBQTE\_Files\_Information.txt

    Filesize

    2KB

    MD5

    2fad4b84c7bff220d63d60d72b49de86

    SHA1

    7cccba807cf8b9c5cc0455e3c972c6e34b4c7b2d

    SHA256

    1276f3f4b3f2b7eb1f49c6de2fa149194ed42ca76f32a2bf23b542d1365eae25

    SHA512

    d2643507f8866c1413fba50c8f4aa389d494af711c57e809660f9d2c809595b716b0f9387e516ed8de684ef22ed5298d3313b69fdfc85aefdfc805693b2a50cd

  • C:\Users\Admin\AppData\Local\Temp\xfyTQBQTE\_Files\_Information.txt

    Filesize

    4KB

    MD5

    94939def44eacd4d52451d6c64da8657

    SHA1

    8429d30e1d455f1cd27097e25ca11dfb56645b6b

    SHA256

    a77f2abebe1cd28a631198d52d4ae4d5a627ce090e348587690b5f374fc17bf1

    SHA512

    cbbda497f649661d6e4a360ee17bac423464f78c3af4d513942a3e8cdba824648eba40f79c0b68f826c28816d6dee7c23764465175c5f8a90a0514656f34c065

  • C:\Users\Admin\AppData\Local\Temp\xfyTQBQTE\files_\screenshot.jpg

    Filesize

    55KB

    MD5

    c9b393fb58dc9c3cd6fd9bfef5a18f2b

    SHA1

    d64f1f3f2d95b0748a5248a06852713685b33239

    SHA256

    ac9fbc83cad0f131866dd1d2c8612d271bec8f60f00d52a0f58cfcd9399197b1

    SHA512

    55cc9993bce6dd411eef47a48a387534b6ab8ff10f8ef29c4af3de76985ed4087325c57a422abe93a54088b0e28546d41d8a40d50a7c340faef51427bf40fc3b

  • memory/3808-131-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-1-0x0000000002DA0000-0x0000000002EA0000-memory.dmp

    Filesize

    1024KB

  • memory/3808-118-0x0000000002DA0000-0x0000000002EA0000-memory.dmp

    Filesize

    1024KB

  • memory/3808-121-0x0000000002C60000-0x0000000002CA5000-memory.dmp

    Filesize

    276KB

  • memory/3808-120-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-122-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3808-125-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-2-0x0000000002C60000-0x0000000002CA5000-memory.dmp

    Filesize

    276KB

  • memory/3808-3-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3808-127-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-140-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-137-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-134-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-143-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-146-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-149-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-152-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-155-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-158-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB

  • memory/3808-161-0x0000000000400000-0x0000000002B8C000-memory.dmp

    Filesize

    39.5MB