General

  • Target

    7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174

  • Size

    4.2MB

  • Sample

    241118-nm862awcqk

  • MD5

    3382492d63afa8096a084f3e4f87ece9

  • SHA1

    3f7d35981af4dd424bd103b8feff31f989b05b36

  • SHA256

    7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174

  • SHA512

    ee4c1c771aaee761fa842eb8505826edfdbdcbc060989c2d2d7bf158a6714b0a78841e5d771abaa3e54cf8c6c89b2bc4dbbbd90ad0035cd61124c922f8cb8a16

  • SSDEEP

    49152:1QpCcR7YYRWP/P+zGLUsN6aCjJZy8zGmTGYJo0USVanngtC0YeXhAZpsNyFLcrCY:1eJYDPhbN69M8zGmX9zSgXY6AfMCI0Y

Malware Config

Targets

    • Target

      7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174

    • Size

      4.2MB

    • MD5

      3382492d63afa8096a084f3e4f87ece9

    • SHA1

      3f7d35981af4dd424bd103b8feff31f989b05b36

    • SHA256

      7650b82fd2ae7782b10ae77260ee7ce75f0a01d49bd43e9f5facdfd9f84d6174

    • SHA512

      ee4c1c771aaee761fa842eb8505826edfdbdcbc060989c2d2d7bf158a6714b0a78841e5d771abaa3e54cf8c6c89b2bc4dbbbd90ad0035cd61124c922f8cb8a16

    • SSDEEP

      49152:1QpCcR7YYRWP/P+zGLUsN6aCjJZy8zGmTGYJo0USVanngtC0YeXhAZpsNyFLcrCY:1eJYDPhbN69M8zGmX9zSgXY6AfMCI0Y

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks