General

  • Target

    4ba3a14b8848a345ee40fe5e6c9a08a3bf7ecfaff176350082871a35a90973ea.exe

  • Size

    4.2MB

  • Sample

    241119-e2mf5svpgl

  • MD5

    ecbc8e5795841534da310554cf558564

  • SHA1

    4f5c4a459c679a613083fb8ebeaf6b72a62099c4

  • SHA256

    4ba3a14b8848a345ee40fe5e6c9a08a3bf7ecfaff176350082871a35a90973ea

  • SHA512

    4f74e57b352d9e64ea7abacf59a44159640a5607dd405ecf70dfe1fc71701d70d696d08e2c58846528b6e2e7931b4edb6b12467fd22c54c38b7fb060ffe2685c

  • SSDEEP

    98304:wVRgxKrnMBOy3mQk4e6kwOmruSo1uEGpPUJsx6:wkMTM8sk4zkP1SoM1a6x6

Malware Config

Targets

    • Target

      4ba3a14b8848a345ee40fe5e6c9a08a3bf7ecfaff176350082871a35a90973ea.exe

    • Size

      4.2MB

    • MD5

      ecbc8e5795841534da310554cf558564

    • SHA1

      4f5c4a459c679a613083fb8ebeaf6b72a62099c4

    • SHA256

      4ba3a14b8848a345ee40fe5e6c9a08a3bf7ecfaff176350082871a35a90973ea

    • SHA512

      4f74e57b352d9e64ea7abacf59a44159640a5607dd405ecf70dfe1fc71701d70d696d08e2c58846528b6e2e7931b4edb6b12467fd22c54c38b7fb060ffe2685c

    • SSDEEP

      98304:wVRgxKrnMBOy3mQk4e6kwOmruSo1uEGpPUJsx6:wkMTM8sk4zkP1SoM1a6x6

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks