General

  • Target

    file.exe

  • Size

    4.2MB

  • Sample

    241120-hkvmzasgjf

  • MD5

    86dce43872ffd26d6225323bf7f0c76f

  • SHA1

    9bee03858ee62de271b3b29b0144b27892927a13

  • SHA256

    2eeba583715e37c4f8632f58d1c49a6d0ef7fdf6815d4bc7593c492a45aca663

  • SHA512

    3768ec45560096f81b6071c201a6bb52f19c294051d2399cd77a6a915e91fa4243d031856321cead807a22f8c71c7bb9c4e1cee1bae70d5d4b9c956abddaa290

  • SSDEEP

    98304:3WRRKpOwiUS4oYNme4NBbyoqbCStRVgEmNG3xkP3JcAU:GRR/wSYUe4NBbN+riE2PZc

Malware Config

Targets

    • Target

      file.exe

    • Size

      4.2MB

    • MD5

      86dce43872ffd26d6225323bf7f0c76f

    • SHA1

      9bee03858ee62de271b3b29b0144b27892927a13

    • SHA256

      2eeba583715e37c4f8632f58d1c49a6d0ef7fdf6815d4bc7593c492a45aca663

    • SHA512

      3768ec45560096f81b6071c201a6bb52f19c294051d2399cd77a6a915e91fa4243d031856321cead807a22f8c71c7bb9c4e1cee1bae70d5d4b9c956abddaa290

    • SSDEEP

      98304:3WRRKpOwiUS4oYNme4NBbyoqbCStRVgEmNG3xkP3JcAU:GRR/wSYUe4NBbN+riE2PZc

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks