General
-
Target
6233c8fbc407fedf798ca55022285070.exe
-
Size
795KB
-
Sample
230306-pl66qabf5x
-
MD5
6233c8fbc407fedf798ca55022285070
-
SHA1
78783ff6e2a153cac811e9d32677c453d5db14d5
-
SHA256
55ad89acf1094dd8eb39690b705e95087d3c90153f78afee3f93af3a64980f9b
-
SHA512
f9ab93fe3f6cbf7abf9ff9562cc39916a58afa37180fec39f4c98738eaa423235fb1b56e172768a2496c9a34b8808ca8a89e5b7fb2bbf367f277a814ac41dc7b
-
SSDEEP
24576:ARfeB78fclU3pb8uJN2vw4+4jJAsmSbGBH:ARaQfclcpb5Ik4jJzmR
Static task
static1
Behavioral task
behavioral1
Sample
6233c8fbc407fedf798ca55022285070.exe
Resource
win7-20230220-en
Malware Config
Extracted
cryptbot
http://lahsfr12.top/gate.php
-
payload_url
http://ahovoh01.top/johnin.dat
Targets
-
-
Target
6233c8fbc407fedf798ca55022285070.exe
-
Size
795KB
-
MD5
6233c8fbc407fedf798ca55022285070
-
SHA1
78783ff6e2a153cac811e9d32677c453d5db14d5
-
SHA256
55ad89acf1094dd8eb39690b705e95087d3c90153f78afee3f93af3a64980f9b
-
SHA512
f9ab93fe3f6cbf7abf9ff9562cc39916a58afa37180fec39f4c98738eaa423235fb1b56e172768a2496c9a34b8808ca8a89e5b7fb2bbf367f277a814ac41dc7b
-
SSDEEP
24576:ARfeB78fclU3pb8uJN2vw4+4jJAsmSbGBH:ARaQfclcpb5Ik4jJzmR
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-