General
-
Target
396ad8d37a4ed7751a9f142a0c23818c.bin
-
Size
1MB
-
Sample
230404-blxqdscb29
-
MD5
b1993bf89134d0a0f904d54796bed936
-
SHA1
a2a6444e1c597e917976b4a4d3a4ca46da087365
-
SHA256
197298e157e8d2d7be56002e4bc762ef9dbee3f0974c03a2f6e9c95332a817ea
-
SHA512
6ec42442512671ae57f818ecde3c4255bff0ae102eb0ed643ec04edf220f19dda03d9ed22924d2eb98ae90f53d6fac9ee8b5042d89afa6d8e7e822b258acfa63
-
SSDEEP
49152:XVlVVE6gEeWY6duFNNOYgL5fNot78zASoKhFo:FFE6rb1DXNyLSBhFo
Static task
static1
Behavioral task
behavioral1
Sample
9d7b0ff63257985d614d7503b396b8d9ce6c2fcb5bcecbcbfcfbad9560da9ffe.exe
Resource
win7-20230220-en
Malware Config
Extracted
cryptbot
http://ivyves72.top/gate.php
-
payload_url
http://womuyt10.top/thraep.dat
Targets
-
-
Target
9d7b0ff63257985d614d7503b396b8d9ce6c2fcb5bcecbcbfcfbad9560da9ffe.exe
-
Size
3MB
-
MD5
396ad8d37a4ed7751a9f142a0c23818c
-
SHA1
91e007c643bda9553e57de1c3c4aa87e15d244ea
-
SHA256
9d7b0ff63257985d614d7503b396b8d9ce6c2fcb5bcecbcbfcfbad9560da9ffe
-
SHA512
09e87973ccc09af79c554a38d8e87656a39c6209ce68d36636fc28e120709ebefeab8e4368d165d89d77d71d6f23e2b8af9702e3bd2ae42fa6f85475cf4d2462
-
SSDEEP
49152:yKY2GhhspR5RKJsBwQcE7Eg+O1SS6xEsSQcb0kIFs9ke:yKY2Ghh0AqrNRRG8
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-