CryptBot

48
Global rank
25
Month rank
20
Week rank
238
IOCs

CryptBot is an advanced Windows-targeting infostealer delivered via pirate sites with "cracked" software. It has been first observed in the wild in 2019.

Infostealer
Type
Unknown
Origin
20 December, 2019
First seen
2 June, 2023
Last seen

How to analyze CryptBot with ANY.RUN

Infostealer
Type
Unknown
Origin
20 December, 2019
First seen
2 June, 2023
Last seen

IOCs

IP addresses
8.208.76.69
188.68.221.52
5.101.50.108
8.208.101.157
8.208.26.99
8.209.99.235
8.209.74.224
8.208.22.49
8.208.88.247
8.209.79.251
8.208.3.5
8.208.11.4
8.208.25.7
8.209.114.138
8.209.74.196
8.209.77.15
8.209.77.210
8.209.78.211
8.208.26.133
8.208.78.141
Hashes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majul.com
isns.net
elx01.knas.systems
sasurr02.top
bube01.info
cedss03.top
moraa10.top
magnar01.top
magnar03.top
sasurr05.top
yahzdaje.website
sasurr03.top
kafurr01.top
sasurr01.top
sdaurr03.top
rifat04.info
cede04.info
cede03.info
lqo01.pro
goga01.xyz
Last Seen at

Recent blog posts

recentPost
How to Create a Task in ANY.RUN:a Step-by-Ste...
watchers 306
comments 0
recentPost
ChatGPT for SOC and Malware Analysis professi...
watchers 5380
comments 0
recentPost
Deobfuscating the Latest GuLoader: Automating...
watchers 3235
comments 3

What is CryptBot malware

CryptBot, initially detected in 2019, is an information stealer designed to compromise Windows operating systems.

Its primary purpose is to exfiltrate confidential data from infected machines, such us:

  • browser credentials
  • cryptocurrency wallet details
  • browser cookies
  • credit card data
  • and system screenshots

The primary distribution channels for CryptBot involve spearphishing emails and illicit software cracks.

CryptoBot is a relatively modern malware. However, it’s authors are constantly evolving the threat, making it harder to detect. Around February 2022 researchers began noticing that threat actors simplified CryptBot’s functionality, making it lighter, leaner, and less likely to be detected.

This saw them remove features such as the anti-sandbox evasion, redundant second C2 connection, second exfiltration folder, screenshot function, and the option to collect data on TXT files on the desktop.

At the same time, post 2022 samples have gained targeted additions and improvements that make them more potent. Previously, the malware could only exfiltrate data from Chrome versions between 81 and 95. Now, CryptBot searches all file paths and exfiltrates user data, regardless of the Chrome version in use. This improvement allows CryptBot to be effective against a wider range of targets.

CryptBot infection method

Initiation of the CryptBot attack sequence typically occurs when an unsuspecting user visits a compromised webpage and is lured into downloading what appears to be a legitimate file, such as an SFX file posing as software like Adobe Photoshop. Once the user downloads the file, a malicious SFX file is placed on their computer. When executed, a folder is created in the user's %Temp% directory, containing several files that enable the subsequent stage of the attack.

The folder might contain an authentic Windows DLL, a BAT script, a concealed AutoIT script, and an AutoIT v3 compiler for executables. Some files might be disguised as image, audio, or video files to hide their actual purpose. The specific file extensions used can vary across different CryptBot versions.

The AutoIT interpreter tool, which is frequently exploited by numerous malware families, plays a role in the attack process. The BAT script examines the victim's system for certain antivirus products and uses a "sleep" function to avoid detection if any are found. It is also in charge of decrypting the highly obfuscated AutoIT script and transferring it to the virtual memory area for execution.

In the end, the AutoIT compiler for executables runs the harmful script, initiating an AutoIT process and loading the CryptBot binary into the system's memory.

How to get more information from CryptBot malware

At ANY.RUN, you can securely execute CryptBot and conduct dynamic analysis within a completely interactive cloud-based sandbox environment. Our platform automatically gathers and presents rich execution data in easy-to-read formats.

CryptBot malware configuration extracted by ANY.RUN Figure 1: CryptBot’s configuration automatically extracted by ANY.RUN

You can collect more info about the analyzed sample by looking at extracted malware configuration. A PCAP file for later analysis is also available for download.

CryptBot infostealer execution process

Upon initiating the initial payload, the execution flow of CryptBot can be variable. Cryptbot might sometimes employ the "compile after delivery" technique for defense evasion or release and execute a second file.

Then, the malware gathers data about the infected system, the software installed, and pilfers credentials. For data exfiltration, the stealer often establishes a connection with the C2 domain, with the ** .top** extension. It's noteworthy that it consistently sends requests to a page named gate.php. After completing these actions, the malware may implement a file deletion technique, deleting itself.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Distribution of CryptBot

In addition to utilizing phishing and spearphishing techniques with infected documents, starting around February 2022, CryptBot has expanded its distribution methods by leveraging cracked software lures to target potential victims.

The strategy involves creating websites that masquerade as providers of software cracks, key generators, pirated games, or other utilities. Then, search engine optimization (SEO) techniques are used to rank the malware distribution sites at the top of Google search results.

The malicious websites undergo frequent updates, employing various lures to attract users. Visitors are taken through a series of redirections before reaching the delivery page, which may be hosted on a compromised legitimate site for SEO poisoning attacks.

Wrapping up

CryptBot's primary targets are individuals searching for software cracks, warez, and other methods of bypassing copyright protection. To avoid infection by CryptBot and other similar malware, users should refrain from downloading such tools.

By staying informed about CryptBot's distribution methods and recent changes, malware analysts and security researchers can better understand this threat and develop effective countermeasures.

Speed up your workflow by analyzing CryptBot in ANY.RUN. Create an account using your business email and try our interactive cloud sandbox for free.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
Ave Maria screenshot
Ave Maria
avemaria stealer trojan rat
Ave Maria malware is a Remote Access Trojan that is also called WARZONE RAT. Hackers use it to control the PCs of their victims remotely and steal information from infected PCs. For example, they can remotely activate the camera to take pictures of a victim and send them to a control server.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy