General

  • Target

    2025-03-27_03aa0a86fe8a404ead2373364966ded0_amadey_avoslocker_black-basta_cobalt-strike_luca-stealer

  • Size

    272KB

  • Sample

    250327-gv6mjsxzfv

  • MD5

    03aa0a86fe8a404ead2373364966ded0

  • SHA1

    5b1889c3281e0f011333f8f041559490fad1066d

  • SHA256

    d81ca689ec0b219abe2d12b2bc7d6eb1a0c76d8d3fda3ebb58a7bae3061ea200

  • SHA512

    545cdc12c5ce65df683b8aa496d8b5ae8fd55b681ca7c6e2b687af672e58dd7353c7f5537636c33dc3a08943319e3b786ba49808dac30b4cd19732463d234174

  • SSDEEP

    6144:HMfmQsWFETIG0upECyQTRj9gced0OcO8r27KyODmPZXAf1uytixeqxF:HMfmQshyQTzgced0w8rEKyOkAf1uyti/

Malware Config

Extracted

Family

cryptbot

C2

befqlo52.top

mortos05.top

Attributes
  • payload_url

    http://mincir07.top/download.php?file=lv.exe

Targets

    • Target

      2025-03-27_03aa0a86fe8a404ead2373364966ded0_amadey_avoslocker_black-basta_cobalt-strike_luca-stealer

    • Size

      272KB

    • MD5

      03aa0a86fe8a404ead2373364966ded0

    • SHA1

      5b1889c3281e0f011333f8f041559490fad1066d

    • SHA256

      d81ca689ec0b219abe2d12b2bc7d6eb1a0c76d8d3fda3ebb58a7bae3061ea200

    • SHA512

      545cdc12c5ce65df683b8aa496d8b5ae8fd55b681ca7c6e2b687af672e58dd7353c7f5537636c33dc3a08943319e3b786ba49808dac30b4cd19732463d234174

    • SSDEEP

      6144:HMfmQsWFETIG0upECyQTRj9gced0OcO8r27KyODmPZXAf1uytixeqxF:HMfmQshyQTzgced0w8rEKyOkAf1uyti/

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks