General
-
Target
bfd5c9433c4242347c9538b7106467e97bb2aef87dd62fa085368346f84981d1.zip
-
Size
859KB
-
Sample
250327-fnkwtsxwgy
-
MD5
59c00e92160f804d2dea8e38b5903584
-
SHA1
dbb679e3dd41b214946910965fb8649ad8bcfd86
-
SHA256
bfd5c9433c4242347c9538b7106467e97bb2aef87dd62fa085368346f84981d1
-
SHA512
a4d074f17145e33a79b2b9c80b4d1362a204328f04f9a0d306800fdffc6926c71f410f3ae26d169d7a63d76f989fb33460143d1d38ba42c9012163c46f30e555
-
SSDEEP
24576:CBRY+T5grzXmipFCQbWnokIqkProVR42FnvoKuu:OYgqmiGOkIqk84shB
Static task
static1
Behavioral task
behavioral1
Sample
bbb7e921c02c44367f13533453ae6d3ab8390dc1e7a4ef27ecc655b76b3248df.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bbb7e921c02c44367f13533453ae6d3ab8390dc1e7a4ef27ecc655b76b3248df.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
bbb7e921c02c44367f13533453ae6d3ab8390dc1e7a4ef27ecc655b76b3248df.exe
-
Size
991KB
-
MD5
731ba8db421ddaff4337a141afd214ae
-
SHA1
c1076efa4f4dab9890cf04164366251467515a31
-
SHA256
bbb7e921c02c44367f13533453ae6d3ab8390dc1e7a4ef27ecc655b76b3248df
-
SHA512
ba436aff804a0febb7f260d54d5f537849dc2f7efe2f3529dcddb81f2fe68144d0361a912dae0dbea73d5f6f4daa11472c097361adc9272b0bd3618c66657483
-
SSDEEP
24576:4QJShOWYqQnzsQNvQFe0MTMoBNE+OycrhZkI:nJShdqsQNvQF9MTMoHohZ
Score10/10-
Cryptbot family
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2