General

  • Target

    file.exe

  • Size

    4.1MB

  • Sample

    241119-vxt87azbkp

  • MD5

    ca00d6c5903f68cf43e74774d7b08a52

  • SHA1

    65e2318a24492c149eb66865f5f3bd4ee09e88bb

  • SHA256

    de16ea07d8934b7746f20ee895293e48e49a7264a589518f04a4c8b8e2bafe8e

  • SHA512

    0ce810baa5f5284c030cb38c9f3057cb5a5973e38ab677177b9f5cde452a6f894bcf42ef16229c497d2fd2f720872803fb121f2ee4264123aa2fe087a9295c8b

  • SSDEEP

    98304:s4FmSAHOtwc4UDt1jgyVeZ6ohvv2ClqlWbEvwkkOn:sGPAFc4Yt5AvvzwlW44xOn

Malware Config

Targets

    • Target

      file.exe

    • Size

      4.1MB

    • MD5

      ca00d6c5903f68cf43e74774d7b08a52

    • SHA1

      65e2318a24492c149eb66865f5f3bd4ee09e88bb

    • SHA256

      de16ea07d8934b7746f20ee895293e48e49a7264a589518f04a4c8b8e2bafe8e

    • SHA512

      0ce810baa5f5284c030cb38c9f3057cb5a5973e38ab677177b9f5cde452a6f894bcf42ef16229c497d2fd2f720872803fb121f2ee4264123aa2fe087a9295c8b

    • SSDEEP

      98304:s4FmSAHOtwc4UDt1jgyVeZ6ohvv2ClqlWbEvwkkOn:sGPAFc4Yt5AvvzwlW44xOn

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks