General
-
Target
ca1265c4904a9241e8f516a277c1fd3a
-
Size
1.7MB
-
Sample
240315-a9lglace3v
-
MD5
ca1265c4904a9241e8f516a277c1fd3a
-
SHA1
04229cc956743eb40cf6929ad2104596eca79661
-
SHA256
8478099cb35474751c48d020189e394433db773d82b8baf8882076647a8a7011
-
SHA512
f73d4eaab2542b812443708a4d6565ba74005bfb53639459e985073ec51c178d3ebbc27f8cf3a32489eef37cd8ee9c04495843976a5652166a1b7dd8fef0777b
-
SSDEEP
49152:43UvMK8wTyTCZ+ojPfg9V7bVw7jCRO0IcG5XN01v/Jp:uUvMMTtQoczXVw7jCJU901v/v
Static task
static1
Behavioral task
behavioral1
Sample
ca1265c4904a9241e8f516a277c1fd3a.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
cryptbot
ewayky18.top
morvay01.top
-
payload_url
http://winezo01.top/download.php?file=lv.exe
Targets
-
-
Target
ca1265c4904a9241e8f516a277c1fd3a
-
Size
1.7MB
-
MD5
ca1265c4904a9241e8f516a277c1fd3a
-
SHA1
04229cc956743eb40cf6929ad2104596eca79661
-
SHA256
8478099cb35474751c48d020189e394433db773d82b8baf8882076647a8a7011
-
SHA512
f73d4eaab2542b812443708a4d6565ba74005bfb53639459e985073ec51c178d3ebbc27f8cf3a32489eef37cd8ee9c04495843976a5652166a1b7dd8fef0777b
-
SSDEEP
49152:43UvMK8wTyTCZ+ojPfg9V7bVw7jCRO0IcG5XN01v/Jp:uUvMMTtQoczXVw7jCJU901v/v
Score10/10-
CryptBot payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-