General
-
Target
file.exe
-
Size
623KB
-
Sample
230416-v5xz2sag54
-
MD5
3978c9186e82aeb44dadca6c7df4d2bd
-
SHA1
146c49d206d64e3df8c9f623b481baf4f931352c
-
SHA256
1f9f25a99544f9a1a83368c1d8fa08600a41863e61b39acf454a25ba2f74265b
-
SHA512
d5b2fcee593beeaacd6b0c003b389c115941a30ea626faf096685662e83f2d489161f730d62e7b4414b56d951ab3bfdf33e99e762e57a3483bedbe3070feae91
-
SSDEEP
12288:m2/EhMPvO9pWxfPpif8Qz0ZM/TS533iC4VwHBny040D8Asil14:m2/EhMPvOpWxfhif3/TU9ySI414
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
cryptbot
http://ubykot72.top/gate.php
-
payload_url
http://moizyv10.top/odious.dat
Extracted
cryptbot
http://ubykot72.top/gate.php
Targets
-
-
Target
file.exe
-
Size
623KB
-
MD5
3978c9186e82aeb44dadca6c7df4d2bd
-
SHA1
146c49d206d64e3df8c9f623b481baf4f931352c
-
SHA256
1f9f25a99544f9a1a83368c1d8fa08600a41863e61b39acf454a25ba2f74265b
-
SHA512
d5b2fcee593beeaacd6b0c003b389c115941a30ea626faf096685662e83f2d489161f730d62e7b4414b56d951ab3bfdf33e99e762e57a3483bedbe3070feae91
-
SSDEEP
12288:m2/EhMPvO9pWxfPpif8Qz0ZM/TS533iC4VwHBny040D8Asil14:m2/EhMPvOpWxfhif3/TU9ySI414
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-