General

  • Target

    bffd07a1ce74ec7aef4b2045ef5dcacd834f7e55e8da8dd50fc37c6545127878.exe

  • Size

    4.2MB

  • Sample

    241119-w6yteavkhm

  • MD5

    0ce39208f8ff92b38a33d77f3c4d9601

  • SHA1

    e91ad26dbc4227079172cc91178931d65de24056

  • SHA256

    bffd07a1ce74ec7aef4b2045ef5dcacd834f7e55e8da8dd50fc37c6545127878

  • SHA512

    fa8528c9606a1f43d2ae9708654c7fdc6f51671ac506bacf0f8e4fd90ba6c415d153b87a4507c86af24fa7a49a80ad5b4e6f81a9e827c1ec532b87d1efbb1ce1

  • SSDEEP

    98304:qF7+e1ndBsTRtHf7wP7SE8SA63D1Qobj1Eo4gwR66OF:qFqe16PHfW7p1TgA6OF

Malware Config

Targets

    • Target

      bffd07a1ce74ec7aef4b2045ef5dcacd834f7e55e8da8dd50fc37c6545127878.exe

    • Size

      4.2MB

    • MD5

      0ce39208f8ff92b38a33d77f3c4d9601

    • SHA1

      e91ad26dbc4227079172cc91178931d65de24056

    • SHA256

      bffd07a1ce74ec7aef4b2045ef5dcacd834f7e55e8da8dd50fc37c6545127878

    • SHA512

      fa8528c9606a1f43d2ae9708654c7fdc6f51671ac506bacf0f8e4fd90ba6c415d153b87a4507c86af24fa7a49a80ad5b4e6f81a9e827c1ec532b87d1efbb1ce1

    • SSDEEP

      98304:qF7+e1ndBsTRtHf7wP7SE8SA63D1Qobj1Eo4gwR66OF:qFqe16PHfW7p1TgA6OF

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks