BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

CryptBot

62
Global rank
83 infographic chevron month
Month rank
76 infographic chevron week
Week rank
562
IOCs

CryptBot is an advanced Windows-targeting infostealer delivered via pirate sites with "cracked" software. It has been first observed in the wild in 2019.

Infostealer
Type
Unknown
Origin
20 December, 2019
First seen
2 April, 2024
Last seen

How to analyze CryptBot with ANY.RUN

Infostealer
Type
Unknown
Origin
20 December, 2019
First seen
2 April, 2024
Last seen

IOCs

Hashes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s.tmp
morbyj05.top
deodd52.top
morexn05.top
ewafve51.top
faodrt28.top
darzcb62.top
bridmz52.top
poqvyg22.top
wyxead72.top
moraaaasf01.top
piperoerrt23.top
moraffdd04.top
leribis02.top
befqlo52.top
mortos05.top
nkoopw11.top
moraass08.top
morgwa06.top
e.exe
URLs
http://vbthre3vs.top/zip.php
http://vseven7sr.top/gate.php;
http://fygbib44.top/gate.php;
http://sginiv12.top/gate.php;
http://sgizfn14.top/gate.php;
http://wuqvas12.top/gate.php;
http://vfive5pn.top/gate.php;
http://vfive5sr.top/gate.php;
http://cfive5vt.top/gate.php;
http://xfive5vs.top/gate.php;
http://xfive5sr.top/gate.php;
http://zfive5vt.top/gate.php;
http://pfive5sr.top/gate.php;
http://psix6sb.top/gate.php;
http://psix6vt.top/gate.php/;
http://xfive5pn.top/gate.php;
http://zfive5vs.top/gate.php;
http://zfive5sr.top/gate.php;
http://pfive5pt.top/gate.php;
http://pfive5vt.top/gate.php/;
Last Seen at

Recent blog posts

post image
How to Use Threat Intelligence Feeds
watchers 353
comments 0
post image
Tools and Technologies ANY.RUN Uses to Protec...
watchers 290
comments 0
post image
Release Notes: YARA Search, New Rules, Config...
watchers 974
comments 0

What is CryptBot malware

CryptBot, initially detected in 2019, is an information stealer designed to compromise Windows operating systems.

Its primary purpose is to exfiltrate confidential data from infected machines, such us:

  • browser credentials
  • cryptocurrency wallet details
  • browser cookies
  • credit card data
  • and system screenshots

The primary distribution channels for CryptBot involve spearphishing emails and illicit software cracks.

CryptoBot is a relatively modern malware. However, it’s authors are constantly evolving the threat, making it harder to detect. Around February 2022 researchers began noticing that threat actors simplified CryptBot’s functionality, making it lighter, leaner, and less likely to be detected.

This saw them remove features such as the anti-sandbox evasion, redundant second C2 connection, second exfiltration folder, screenshot function, and the option to collect data on TXT files on the desktop.

At the same time, post 2022 samples have gained targeted additions and improvements that make them more potent. Previously, the malware could only exfiltrate data from Chrome versions between 81 and 95. Now, CryptBot searches all file paths and exfiltrates user data, regardless of the Chrome version in use. This improvement allows CryptBot to be effective against a wider range of targets.

CryptBot infection method

Initiation of the CryptBot attack sequence typically occurs when an unsuspecting user visits a compromised webpage and is lured into downloading what appears to be a legitimate file, such as an SFX file posing as software like Adobe Photoshop. Once the user downloads the file, a malicious SFX file is placed on their computer. When executed, a folder is created in the user's %Temp% directory, containing several files that enable the subsequent stage of the attack.

The folder might contain an authentic Windows DLL, a BAT script, a concealed AutoIT script, and an AutoIT v3 compiler for executables. Some files might be disguised as image, audio, or video files to hide their actual purpose. The specific file extensions used can vary across different CryptBot versions.

The AutoIT interpreter tool, which is frequently exploited by numerous malware families, plays a role in the attack process. The BAT script examines the victim's system for certain antivirus products and uses a "sleep" function to avoid detection if any are found. It is also in charge of decrypting the highly obfuscated AutoIT script and transferring it to the virtual memory area for execution.

In the end, the AutoIT compiler for executables runs the harmful script, initiating an AutoIT process and loading the CryptBot binary into the system's memory.

How to get more information from CryptBot malware

At ANY.RUN, you can securely execute CryptBot and conduct dynamic analysis within a completely interactive cloud-based sandbox environment. Our platform automatically gathers and presents rich execution data in easy-to-read formats.

CryptBot malware configuration extracted by ANY.RUN Figure 1: CryptBot’s configuration automatically extracted by ANY.RUN

You can collect more info about the analyzed sample by looking at extracted malware configuration. A PCAP file for later analysis is also available for download.

CryptBot infostealer execution process

Upon initiating the initial payload, the execution flow of CryptBot can be variable. Cryptbot might sometimes employ the "compile after delivery" technique for defense evasion or release and execute a second file.

Then, the malware gathers data about the infected system, the software installed, and pilfers credentials. For data exfiltration, the stealer often establishes a connection with the C2 domain, with the ** .top** extension. It's noteworthy that it consistently sends requests to a page named gate.php. After completing these actions, the malware may implement a file deletion technique, deleting itself.

Read a detailed analysis of CryptBot in our blog.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of CryptBot

In addition to utilizing phishing and spearphishing techniques with infected documents, starting around February 2022, CryptBot has expanded its distribution methods by leveraging cracked software lures to target potential victims.

The strategy involves creating websites that masquerade as providers of software cracks, key generators, pirated games, or other utilities. Then, search engine optimization (SEO) techniques are used to rank the malware distribution sites at the top of Google search results.

The malicious websites undergo frequent updates, employing various lures to attract users. Visitors are taken through a series of redirections before reaching the delivery page, which may be hosted on a compromised legitimate site for SEO poisoning attacks.

Wrapping up

CryptBot's primary targets are individuals searching for software cracks, warez, and other methods of bypassing copyright protection. To avoid infection by CryptBot and other similar malware, users should refrain from downloading such tools.

By staying informed about CryptBot's distribution methods and recent changes, malware analysts and security researchers can better understand this threat and develop effective countermeasures.

Speed up your workflow by analyzing CryptBot in ANY.RUN. Create an account using your business email and try our interactive cloud sandbox for free.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy