General
-
Target
crona.exe
-
Size
3.7MB
-
Sample
230614-y57q2ade9t
-
MD5
ccf4763882256111f713d881ad7d9aa9
-
SHA1
507297f20fd3fbda9a8cd426bbcffdeb8e4e8ab1
-
SHA256
59d9b80d021e8dc40f387d759ce6f77c56330a07352c0238f1768116cf80ebf7
-
SHA512
53d20ba5739d1205be1b16966d981881ea8c9b0b8c9880b1e407f354e025b6ccae61e653b78d6a9e3d9c5023ff09143b365545c411809b645ac24f8620580416
-
SSDEEP
98304:o+bU8AtKpng3RiQT0Q9zc7J7MRNCwZMGzcf+UctPK0:o+bUVtKxg3RiQ7z0J7MuwDzcGUck
Static task
static1
Behavioral task
behavioral1
Sample
crona.exe
Resource
win7-20230220-en
Malware Config
Extracted
laplas
http://45.159.189.105
-
api_key
7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e
Targets
-
-
Target
crona.exe
-
Size
3.7MB
-
MD5
ccf4763882256111f713d881ad7d9aa9
-
SHA1
507297f20fd3fbda9a8cd426bbcffdeb8e4e8ab1
-
SHA256
59d9b80d021e8dc40f387d759ce6f77c56330a07352c0238f1768116cf80ebf7
-
SHA512
53d20ba5739d1205be1b16966d981881ea8c9b0b8c9880b1e407f354e025b6ccae61e653b78d6a9e3d9c5023ff09143b365545c411809b645ac24f8620580416
-
SSDEEP
98304:o+bU8AtKpng3RiQT0Q9zc7J7MRNCwZMGzcf+UctPK0:o+bUVtKxg3RiQ7z0J7MuwDzcGUck
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-