

Over 11 Million Android Devices Infected with ‘Necro’ Spyware Through Google Play – Active IOCs
September 24, 2024
North Korean APT Kimsuky aka Black Banshee – Active IOCs
September 25, 2024
Over 11 Million Android Devices Infected with ‘Necro’ Spyware Through Google Play – Active IOCs
September 24, 2024
North Korean APT Kimsuky aka Black Banshee – Active IOCs
September 25, 2024Severity
High
Analysis Summary
CryptBot - a Windows malware - is capable of stealing credentials for browsers, cryptocurrency wallets, browser cookies, and credit cards, and creates screenshots of the infected system. Cryptbot hides within legitimate software to be installed by its victims. CryptBot threat actors spread malware via websites purportedly offering software cracks, key generators, or other tools. To gain widespread visibility, threat actors utilize search engine optimization to position malware distribution sites toward the top of Google search results, resulting in a steady stream of potential victims. It can also spread through a fake VPN client which is called Inter VPN, when executed, it infects the system with Cryptbot and Vidar which then runs an AutoHotKey script leading to download executables from malicious websites.
Impact
- Credential Theft
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
- 6e860af01695658d323ab44a31ba7c6b
- 78f9470c1fc9e230702bfc8e1668a8c8
- f66beee3aae7cd92f02270a910b70231
- 2426fa19f0c2cc5de92d6ef43337c2d1
- 950cfc590026c689357a2db4c9de3fa6
- d048c147fe730a77e30b2efd85ebfe97
- af196dcc95170ab54860051830a7d587
- 666cf8a81ba6f3c5bb9b61d200584441
- fe00d6961e0dc7002c7c86bed9495c79
SHA-256
- 9b4321c5053081493b0aa919e8254f677fd19faed543de23b080967d1ad6ab27
- 2802d71a1e4a703ffbef8ce02a5f844731ef6644a4d5894acc593cbdb90a40a4
- a89687d296782db168a92a496fb865d481666cf53588684f69ecac509711da16
- 4d10776348522e720fd36f175f9f735039e4aa3ae9543886320cd75e45e77754
- 0c27861f03c8d88d8ad32b06a63f329a9ad895312abb6878600aeb9ce745b67a
- 39ef51afa4b5a9f930af06bcb4bdf50e289b522c40888ff3015d9486b8b4cdcf
- a8a451b18143b192de1f6da327400e4fe0b629386d0c9dbf0d77e002e8ca6610
- 0b14c37c84d89fd4939173c7cdb22f18c76098756fdb90694a63232f68530050
- 7756efa9a5914c3141479ab8de889d6aa48f25fed3997cc165fafd4b7ab54ff9
SHA1
- 1979b1ca9019f3f06caf3c5cb693f0b231914013
- b0a3cc1c084d11c8f5004a30be115ecb9cdccc28
- f8f1ce1dde9118e6d40426256756a201be9b0f65
- 97b742a006365ad06a8d0933da8d72c51cca8e63
- 7fb0b7fd533b622c48cd02d056493aac1e93acbd
- febf2874b6fdc8a8fa7db8c524fe9d733cf6145b
- 9fecb3cfb22a2717c5f0424aa7c197d0ab80c365
- 78d1cde65dbd232930a836f00d3c37003f583b6f
- b0c47152746861607720ec0b185dcd4a597926a5
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.