General
-
Target
7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174.exe
-
Size
4.2MB
-
Sample
241118-cw6aysvrfs
-
MD5
3382492d63afa8096a084f3e4f87ece9
-
SHA1
3f7d35981af4dd424bd103b8feff31f989b05b36
-
SHA256
7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174
-
SHA512
ee4c1c771aaee761fa842eb8505826edfdbdcbc060989c2d2d7bf158a6714b0a78841e5d771abaa3e54cf8c6c89b2bc4dbbbd90ad0035cd61124c922f8cb8a16
-
SSDEEP
49152:1QpCcR7YYRWP/P+zGLUsN6aCjJZy8zGmTGYJo0USVanngtC0YeXhAZpsNyFLcrCY:1eJYDPhbN69M8zGmX9zSgXY6AfMCI0Y
Static task
static1
Behavioral task
behavioral1
Sample
7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174.exe
-
Size
4.2MB
-
MD5
3382492d63afa8096a084f3e4f87ece9
-
SHA1
3f7d35981af4dd424bd103b8feff31f989b05b36
-
SHA256
7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174
-
SHA512
ee4c1c771aaee761fa842eb8505826edfdbdcbc060989c2d2d7bf158a6714b0a78841e5d771abaa3e54cf8c6c89b2bc4dbbbd90ad0035cd61124c922f8cb8a16
-
SSDEEP
49152:1QpCcR7YYRWP/P+zGLUsN6aCjJZy8zGmTGYJo0USVanngtC0YeXhAZpsNyFLcrCY:1eJYDPhbN69M8zGmX9zSgXY6AfMCI0Y
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1