General

  • Target

    2f56038a57495ab5608e1c67f7dbd688.bin.exe

  • Size

    8.7MB

  • Sample

    221130-g2m4sadg59

  • MD5

    2f56038a57495ab5608e1c67f7dbd688

  • SHA1

    4da970efac6083ea26971c319671bcc2d6efd71a

  • SHA256

    6acd081ddf2683294dc75bb6eecd6bad5480d822b425043f245daab1970a93d0

  • SHA512

    12f1774ce6371fe1bcbee92107c46823694416e98068083e4d38c5a3381a4ca07b6d0895c6c09fb1c590fc20d9ed1e9928cedb6e0608a91c3addb4c9eee7520a

  • SSDEEP

    196608:dDUIKAOLfrO/vgf8s3YLo71iEHj9kZVz/RV:dAIKRjrO/aILU1J9kx

Malware Config

Targets

    • Target

      2f56038a57495ab5608e1c67f7dbd688.bin.exe

    • Size

      8.7MB

    • MD5

      2f56038a57495ab5608e1c67f7dbd688

    • SHA1

      4da970efac6083ea26971c319671bcc2d6efd71a

    • SHA256

      6acd081ddf2683294dc75bb6eecd6bad5480d822b425043f245daab1970a93d0

    • SHA512

      12f1774ce6371fe1bcbee92107c46823694416e98068083e4d38c5a3381a4ca07b6d0895c6c09fb1c590fc20d9ed1e9928cedb6e0608a91c3addb4c9eee7520a

    • SSDEEP

      196608:dDUIKAOLfrO/vgf8s3YLo71iEHj9kZVz/RV:dAIKRjrO/aILU1J9kx

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

2
T1005

Tasks