General

  • Target

    32fc2fb2f7606905f982f3ff40f562ed0aa056376724261b88be8b9aa041f641.exe

  • Size

    4.2MB

  • Sample

    241112-lmvyaszdlj

  • MD5

    7c551c2712b1721d8007297d97370984

  • SHA1

    9eca6e9eab2c2938ff8bfeb0831fd36755bb4460

  • SHA256

    32fc2fb2f7606905f982f3ff40f562ed0aa056376724261b88be8b9aa041f641

  • SHA512

    b90da2abe442a0749b725f1ace3b582b8579750328f6416c04065d50868d69708efd8129ff43c2fe8f5274e049a8943fefa14ab6c89dd8d638b82c06bd698b37

  • SSDEEP

    98304:bu2Xhl+vTg1IOimQqeSqqWx4Q2Xoa37B3zvIxSud7a+NAQL1:bdX3+vM2EzxUN2XoaN3zvIEudW+NXp

Malware Config

Targets

    • Target

      32fc2fb2f7606905f982f3ff40f562ed0aa056376724261b88be8b9aa041f641.exe

    • Size

      4.2MB

    • MD5

      7c551c2712b1721d8007297d97370984

    • SHA1

      9eca6e9eab2c2938ff8bfeb0831fd36755bb4460

    • SHA256

      32fc2fb2f7606905f982f3ff40f562ed0aa056376724261b88be8b9aa041f641

    • SHA512

      b90da2abe442a0749b725f1ace3b582b8579750328f6416c04065d50868d69708efd8129ff43c2fe8f5274e049a8943fefa14ab6c89dd8d638b82c06bd698b37

    • SSDEEP

      98304:bu2Xhl+vTg1IOimQqeSqqWx4Q2Xoa37B3zvIxSud7a+NAQL1:bdX3+vM2EzxUN2XoaN3zvIEudW+NXp

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks