General
-
Target
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175
-
Size
4.2MB
-
Sample
220731-nvb69sece5
-
MD5
711314433abf81f90b6e54ee7c80a217
-
SHA1
2bd6a1acec7217207f17816fb8ee0ecfe747d4f5
-
SHA256
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175
-
SHA512
9be7405d83715f2ab3add06a42ec7eb162ce0fd02d87560c5f86cfc237506179092f1e847fa737a0f9bbdb4ce67d1590f4024c872b0f83a22400c823af7f0944
-
SSDEEP
98304:kMQaI5Gn2QfXHZwaNsflwf4QLypfIaa2uL3adc5orvA+1o:kMDl22XH+S+tEOLe3asor4+C
Static task
static1
Behavioral task
behavioral1
Sample
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe
Resource
win7-20220715-en
Malware Config
Extracted
cryptbot
newyaer01.top
Targets
-
-
Target
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175
-
Size
4.2MB
-
MD5
711314433abf81f90b6e54ee7c80a217
-
SHA1
2bd6a1acec7217207f17816fb8ee0ecfe747d4f5
-
SHA256
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175
-
SHA512
9be7405d83715f2ab3add06a42ec7eb162ce0fd02d87560c5f86cfc237506179092f1e847fa737a0f9bbdb4ce67d1590f4024c872b0f83a22400c823af7f0944
-
SSDEEP
98304:kMQaI5Gn2QfXHZwaNsflwf4QLypfIaa2uL3adc5orvA+1o:kMDl22XH+S+tEOLe3asor4+C
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-