General

  • Target

    file.exe

  • Size

    4.2MB

  • Sample

    241114-ek8caaxqdl

  • MD5

    795235b5f81a3784ac5954284378d8dd

  • SHA1

    5fba2c6437356440e96e4b2f95ded179a9b53dda

  • SHA256

    555958860f66ea6824d89d939712e8b67e59efecae6cb72a696717266b79acf9

  • SHA512

    2e1c5a83cbf746d94c4b3a170e32fa5c710a59d674ffb8ead446fbb15fbb52825a4f0d2c4d9ed93e036628e623c3451ddec4fda9dfac64f742bb37ef6c22b129

  • SSDEEP

    98304:wGTmC1uTpGvKyoZoGINiITH/PWosDyWVpg0CuDIApp:zaVN02WTHZagA

Malware Config

Targets

    • Target

      file.exe

    • Size

      4.2MB

    • MD5

      795235b5f81a3784ac5954284378d8dd

    • SHA1

      5fba2c6437356440e96e4b2f95ded179a9b53dda

    • SHA256

      555958860f66ea6824d89d939712e8b67e59efecae6cb72a696717266b79acf9

    • SHA512

      2e1c5a83cbf746d94c4b3a170e32fa5c710a59d674ffb8ead446fbb15fbb52825a4f0d2c4d9ed93e036628e623c3451ddec4fda9dfac64f742bb37ef6c22b129

    • SSDEEP

      98304:wGTmC1uTpGvKyoZoGINiITH/PWosDyWVpg0CuDIApp:zaVN02WTHZagA

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks