General

  • Target

    f2375ffda777cb04f0766e64b5ddf3783e59bc651f6caab6517e4bd60fb712d7.exe

  • Size

    4.2MB

  • Sample

    241112-dmmypawqbj

  • MD5

    69f107f438829ff5f8d87c9c26af72e3

  • SHA1

    1f29342564644db3d1c435a886f8a88cd4b05601

  • SHA256

    f2375ffda777cb04f0766e64b5ddf3783e59bc651f6caab6517e4bd60fb712d7

  • SHA512

    5dd980e0c0c232fd6b85ade1b30fdad783908bf0eddaa23315881df57361031f379f85bbbbc218e25db30cd8a2fcb092fdee86f2cae8ebce607a6dda759dc955

  • SSDEEP

    98304:bu2Xhl+vTg1IOimQqeSqqWx4Q2Xoa37B3zvIxSud7a+NAQL:bdX3+vM2EzxUN2XoaN3zvIEudW+NX

Malware Config

Targets

    • Target

      f2375ffda777cb04f0766e64b5ddf3783e59bc651f6caab6517e4bd60fb712d7.exe

    • Size

      4.2MB

    • MD5

      69f107f438829ff5f8d87c9c26af72e3

    • SHA1

      1f29342564644db3d1c435a886f8a88cd4b05601

    • SHA256

      f2375ffda777cb04f0766e64b5ddf3783e59bc651f6caab6517e4bd60fb712d7

    • SHA512

      5dd980e0c0c232fd6b85ade1b30fdad783908bf0eddaa23315881df57361031f379f85bbbbc218e25db30cd8a2fcb092fdee86f2cae8ebce607a6dda759dc955

    • SSDEEP

      98304:bu2Xhl+vTg1IOimQqeSqqWx4Q2Xoa37B3zvIxSud7a+NAQL:bdX3+vM2EzxUN2XoaN3zvIEudW+NX

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks