General
-
Target
51190e0dc5495766f83213fd34009af5.exe
-
Size
2.5MB
-
Sample
220920-s2f61shbcn
-
MD5
51190e0dc5495766f83213fd34009af5
-
SHA1
69d9b3995105cdfb7a86f3bbf9386ef214fb1290
-
SHA256
af0403b7c12d7b7fa9c487eb4a6e68705e9247abf7bc542f77168bd4ed3408fb
-
SHA512
fc5e535f3329e5042546b7f491a652152293bfeafedef2e06e0eba5706a16cc946c64f130d34879be6de6a740ae520fc65143910e29ab5bb3f48ffb63a8a5b28
-
SSDEEP
24576:YoqqcSy2wbUXoArd8SFErUYZ+uNrLFW5CPNWqo0N4IJpsqbMFGf0gAF0NPHyO034:CqcJdiq+WZdgGf6RuyVJi
Static task
static1
Behavioral task
behavioral1
Sample
51190e0dc5495766f83213fd34009af5.exe
Resource
win7-20220812-en
Malware Config
Extracted
cryptbot
http://dixuip12.top/gate.php
-
payload_url
http://luedil01.top/bhutan.dat
Targets
-
-
Target
51190e0dc5495766f83213fd34009af5.exe
-
Size
2.5MB
-
MD5
51190e0dc5495766f83213fd34009af5
-
SHA1
69d9b3995105cdfb7a86f3bbf9386ef214fb1290
-
SHA256
af0403b7c12d7b7fa9c487eb4a6e68705e9247abf7bc542f77168bd4ed3408fb
-
SHA512
fc5e535f3329e5042546b7f491a652152293bfeafedef2e06e0eba5706a16cc946c64f130d34879be6de6a740ae520fc65143910e29ab5bb3f48ffb63a8a5b28
-
SSDEEP
24576:YoqqcSy2wbUXoArd8SFErUYZ+uNrLFW5CPNWqo0N4IJpsqbMFGf0gAF0NPHyO034:CqcJdiq+WZdgGf6RuyVJi
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-