General
-
Target
b9c1b1fa7c7d72fbd7fb7e3ee7749b73da02b44db92e4a87dfadbaaff5f0137d.exe
-
Size
4.2MB
-
Sample
241119-w4tfxazhnj
-
MD5
416cbb435775177c45aae15c3a0e1ff1
-
SHA1
fe6c6d31ecb257273d77474eeae5ef2a1c4debed
-
SHA256
b9c1b1fa7c7d72fbd7fb7e3ee7749b73da02b44db92e4a87dfadbaaff5f0137d
-
SHA512
d4ad661bf3604e258cd8ccbdac13dc6c04f6ed86c2f9e48b5cb76f46c722744ffde417c06026e449ab9b6f0c1695aeb213d2fdfe2802850dddbac881c104c04b
-
SSDEEP
98304:l5PBm/JegvH+mokBbmL7e9AMfpEWNl6pl4heOyydWmBL/uTu08e3m:nP8hTvemokBAZMsl4heLypuTu0j3m
Static task
static1
Behavioral task
behavioral1
Sample
b9c1b1fa7c7d72fbd7fb7e3ee7749b73da02b44db92e4a87dfadbaaff5f0137d.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b9c1b1fa7c7d72fbd7fb7e3ee7749b73da02b44db92e4a87dfadbaaff5f0137d.exe
-
Size
4.2MB
-
MD5
416cbb435775177c45aae15c3a0e1ff1
-
SHA1
fe6c6d31ecb257273d77474eeae5ef2a1c4debed
-
SHA256
b9c1b1fa7c7d72fbd7fb7e3ee7749b73da02b44db92e4a87dfadbaaff5f0137d
-
SHA512
d4ad661bf3604e258cd8ccbdac13dc6c04f6ed86c2f9e48b5cb76f46c722744ffde417c06026e449ab9b6f0c1695aeb213d2fdfe2802850dddbac881c104c04b
-
SSDEEP
98304:l5PBm/JegvH+mokBbmL7e9AMfpEWNl6pl4heOyydWmBL/uTu08e3m:nP8hTvemokBAZMsl4heLypuTu0j3m
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1