Rewterz
RedLine Stealer – Active IOCs
October 11, 2024
Rewterz
Russian APT29 Targets Zimbra and TeamCity Servers
October 11, 2024

CryptBot Trojan – Active IOCs

Severity

High

Analysis Summary

CryptBot - a Windows malware - is capable of stealing credentials for browsers, cryptocurrency wallets, browser cookies, and credit cards, and creates screenshots of the infected system. Cryptbot hides within legitimate software to be installed by its victims. CryptBot threat actors spread malware via websites purportedly offering software cracks, key generators, or other tools. To gain widespread visibility, threat actors utilize search engine optimization to position malware distribution sites toward the top of Google search results, resulting in a steady stream of potential victims. It can also spread through a fake VPN client which is called Inter VPN, when executed, it infects the system with Cryptbot and Vidar which then runs an AutoHotKey script leading to download executables from malicious websites.

Impact

  • Credential Theft
  • Information Theft
  • Exposure of Sensitive Data

Indicators of Compromise

MD5

  • 3394808f2d5c141b86e33a51ace8a577
  • 735bb5f55a17215700840c04a8b40a03
  • eadf1731c7b0155cef6e7813007c73ca
  • 4574de6b9f970058f5306aa830f3a132
  • 284c99e2aa6644acd914e7d1a245deed
  • 12d5fa98ac8df2269cd67123ddafd2c0

SHA-256

  • 277eafa55c929bc4c805bd1d540d2385922ddcc26ad360af7b947987ca45e758
  • 5ea6a5e3bc6c02cc41637028050c3738c38a07917e373637928b314c5d22f84d
  • 432f4077d2f9d7e37290e2baef855ed9943712c40808ba1394892c61275b57cc
  • f01c47e86b246822b78bd19aa5bf9c9e5b31b678a121b2fa019c19f329c8afb2
  • bc33badea9ccccd82318804b9de1b04d0f75485961c4fa3389e5dd7d959145a9
  • 65421350e574e37c5422387c8e16dcbaebf439878434d8983c5f45cb40dc3477

SHA1

  • 2bb0408fff0e02cbe8bd35cf0fe12e63d5bd08e1
  • 55e0828c6d08653939eee2b1af8fd737e92266c4
  • 582c875ea0604fcac26a1535b0899fd7d36a4ca7
  • b3fd47452f7ef17384b23de4db94f8f9c922f598
  • 9eecd29f9ece71b815b8698c587693810db51184
  • 5f0c09ce3d119870210cd9219a5522aa7a206cb3

Remediation

  • Block all threat indicators at your respective controls.
  • Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
  • Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
  • Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.