General
-
Target
dd2cb882d1c389c64e7648022451ddb335279ffe4564bafa932cc673273ebd29
-
Size
2.7MB
-
Sample
220105-yb29fsafd2
-
MD5
a5aafab67dfcad2fae7b85c7bcccbb5d
-
SHA1
59cb807951956f1c62e4cfb355d5529de0ca729e
-
SHA256
dd2cb882d1c389c64e7648022451ddb335279ffe4564bafa932cc673273ebd29
-
SHA512
f21a00af7021f137e6336e4a9597239ecfb57ce77dd6888a3215e282de0b53b2690456e0e471a7a65339ef397767a27f762b5ad2f4a6f4356ef04ff809f3af3e
Static task
static1
Malware Config
Extracted
cryptbot
zyonwd32.top
morynt03.top
-
payload_url
http://yapstn04.top/download.php?file=daladi.exe
Targets
-
-
Target
dd2cb882d1c389c64e7648022451ddb335279ffe4564bafa932cc673273ebd29
-
Size
2.7MB
-
MD5
a5aafab67dfcad2fae7b85c7bcccbb5d
-
SHA1
59cb807951956f1c62e4cfb355d5529de0ca729e
-
SHA256
dd2cb882d1c389c64e7648022451ddb335279ffe4564bafa932cc673273ebd29
-
SHA512
f21a00af7021f137e6336e4a9597239ecfb57ce77dd6888a3215e282de0b53b2690456e0e471a7a65339ef397767a27f762b5ad2f4a6f4356ef04ff809f3af3e
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-