{"id":2943,"date":"2024-09-25T20:35:21","date_gmt":"2024-09-25T20:35:21","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2943"},"modified":"2025-07-29T06:47:18","modified_gmt":"2025-07-29T06:47:18","slug":"kryptik-malware-collecting-college-cash","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/kryptik-malware-collecting-college-cash\/","title":{"rendered":"Kryptik malware collecting college cash"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"477\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/pexels-photo-267885.webp\" alt=\"Degree Achiver\" class=\"wp-image-2959\" style=\"width:777px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p><strong>Overview<\/strong><br><br>Since its creation six years ago, Kryptik malware has been used in various campaigns \u2013 the most of recent of which was in <a href=\"https:\/\/www.mediapost.com\/publications\/article\/314626\/global-malware-report-confirms-prevalence-role-of.html\" target=\"_blank\" rel=\"noopener\">October last year<\/a> where 300,000 detections were recorded in the U.S alone. Interestingly, 94 per cent of these cases were in West Virginia, which coincided with elections for the state governor.&nbsp;<br><br>We recently spotted a sample of the latest Kryptik variant which we\u2019ll dissect today. Most AV vendors detect this version as \u201cMSIL-Kryptik malware\u201d.<br><br>File details:&nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;MD5: 245468fca16ae49742f45a95ce4d5a8a<br><br>\u2022&nbsp;&nbsp; &nbsp;File Size: 869 KB<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"463\" height=\"238\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-9-1.webp\" alt=\"\" class=\"wp-image-2956\"\/><\/figure>\n\n\n\n<p>&nbsp;<br><em>Figure 1 compiled in .net<\/em><br><br><strong>Static analysis<\/strong><br><br>This variant is compiled in .net and one of the first things we noticed was a large list of resources named \u2018Membership_system\u2019:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"379\" height=\"383\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-9-1.webp\" alt=\"\" class=\"wp-image-2957\"\/><\/figure>\n\n\n\n<p><em>Figure 2 &nbsp;File resources<\/em><br><br>The resources include files named \u2018account form\u2019, \u2018account list\u2019, \u2018account registration\u2019, and \u2018student form\u2019.&nbsp;<br><br>After investigating further, our researchers spotted the same list of resources in the code\u2019s functions and classes:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"231\" height=\"411\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-8-1.webp\" alt=\"\" class=\"wp-image-2958\"\/><\/figure>\n\n\n\n<p><em>Figure 3 \u2018Member_System\u2019 Functions and Classes<\/em><br><br>Account_form and account_list contains boxes like \u2018username\u2019, \u2018password\u2019, \u2018first name\u2019 and \u2018last name\u2019. We also discovered buttons like btn_toggle (toggle), btn_update (update), btn_back (back), and btn_delete (delete). We checked the admin, payment, and student forms, and found each has details you\u2019d expect to see in a University form such as fee payment for the year, semester and class details.&nbsp;<br><br><strong>Dynamic analysis<\/strong><br><br>We executed the sample in a controlled environment and discovered more artefacts such as the creation of folders and files in suspicious locations (%appdata%).<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Folders Created: 2<br>&nbsp;&nbsp; &nbsp;c:\\Documents and Settings\\User Name\\Application Data\\Microsoft\\Windows<br>&nbsp;&nbsp; &nbsp;c:\\Documents and Settings\\User Name\\Application Data\\Microsoft\\Windows\\DwiDesk<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>File dropping tricks:<\/strong><br><br>In general, a piece of malware will drop a file in the %appdata% location to maintain persistence with the help of run entry. In this case, we observed a trick where duplicate PE files are dropped in the following location:<br><br>\u201cc:\\Documents and Settings\\User Name\\Application Data\\Microsoft\\Windows\\DwiDesk\\ WinReg32.exe\u201d.&nbsp;<br><br>A link file of the WinReg.exe is then copied into the %appdata% location \u201cc:\\Documents and Settings\\User Name\\Application Data\\WinReg.lnk\u201d.&nbsp;<br><br>This link file is pointing to the PE file inside the \u201c%appdata%\\Microsoft\\Windows\\DwiDesk\\WinReg.exe\u201d location. This link file maintains persistence with the help of the following run entry:<br><br>Registry entry added:<br><br>\u2022&nbsp;&nbsp; &nbsp;Key: &#8220;HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce&#8221;&nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;Value as &#8220;Load&#8221;&nbsp;<br><br>Physical location as &#8220;c:\\Documents and Settings\\User Name\\Application Data\\WinReg32.lnk&#8221;&nbsp;<br><br><strong>IOC:<\/strong><br><br>Files and Folder:<br><br>\u2022&nbsp;&nbsp; &nbsp;MD5: 245468fca16ae49742f45a95ce4d5a8a<br><br>\u2022&nbsp;&nbsp; &nbsp;\u201cc:\\Documents and Settings\\User Name\\Application Data\\WinReg.lnk\u201d &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;\u201cc:\\Documents and Settings\\User Name\\Application &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Data\\Microsoft\\Windows\\DwiDesk\\WinReg.exe\u201d<br><br>\u2022&nbsp;&nbsp; &nbsp;\u201cc:\\Documents and Settings\\User Name\\Application Data%\\Microsoft\\Windows\\DwiDesk\u201d<br><br>Malicious Domain:<br><br>\u2022&nbsp;&nbsp; &nbsp;crackstar.ddns(.)net<br><br>Registry entries:<br><br>\u2022&nbsp;&nbsp; &nbsp;&#8220;HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce&#8221; &nbsp;\u201cLoad\u201d<br><br>\u2022&nbsp;&nbsp; &nbsp;\u201cc:\\Documents and Settings\\User Name\\Application Data\\WinReg32.lnk\u201d<br><br><strong>Conclusion<\/strong><br><br>It is clear this variant is used to target University students. Our analysis indicates of the code shows a fake application has been developed to collect student payment details.<br><br>Students would be targeted with an email crafted to look as though it came from their education institution. The email would include a link leading the student to a website hosting the Kryptik malware. Thinking they\u2019re interacting with a legitimate website, students would be duped into handing their personal and payment details over to attackers.&nbsp;<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Since its creation six years ago, Kryptik malware has been used in various campaigns &ndash; the most of recent of which was in October last year where 300,000 detections were recorded in the U.S alone. Interestingly, 94 per cent of these cases were in West Virginia, which coincided with elections for the state governor.&nbsp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2959,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2943"}],"version-history":[{"count":6,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2943\/revisions"}],"predecessor-version":[{"id":4344,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2943\/revisions\/4344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2959"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}