General
-
Target
4d50f5e9e375f71ff3ac1e806c60a728.exe
-
Size
2.6MB
-
Sample
220226-j96l7sbddj
-
MD5
4d50f5e9e375f71ff3ac1e806c60a728
-
SHA1
76c1a682a7661810b8a608cc91c67bfdd15933b5
-
SHA256
3678e658fdc8ef06809080bc210a3bce96157e1940fa9bd107759a448ff6b281
-
SHA512
9c8f5c3b3273ee7c9eb42af195d9fad98c1b2bfc8ea592e8e5c147cae082bd0609a5f31e7257721f68494ed205a02b4227870cec4e6934fa7868d5eead0bb770
Static task
static1
Behavioral task
behavioral1
Sample
4d50f5e9e375f71ff3ac1e806c60a728.exe
Resource
win7-en-20211208
Malware Config
Extracted
cryptbot
briymk62.top
Targets
-
-
Target
4d50f5e9e375f71ff3ac1e806c60a728.exe
-
Size
2.6MB
-
MD5
4d50f5e9e375f71ff3ac1e806c60a728
-
SHA1
76c1a682a7661810b8a608cc91c67bfdd15933b5
-
SHA256
3678e658fdc8ef06809080bc210a3bce96157e1940fa9bd107759a448ff6b281
-
SHA512
9c8f5c3b3273ee7c9eb42af195d9fad98c1b2bfc8ea592e8e5c147cae082bd0609a5f31e7257721f68494ed205a02b4227870cec4e6934fa7868d5eead0bb770
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-