General

  • Target

    file.exe

  • Size

    4.2MB

  • Sample

    241121-3mzd6axjfl

  • MD5

    40cb4053a584486a21a109ffb44933c9

  • SHA1

    07a94039a6176646ecdb0a5b0fab59b632bdbd18

  • SHA256

    71b2a45658b6d8df33fc9bacc2c938ec598db52f8a477d859632d774802c0d84

  • SHA512

    58356679459f0c4126905cb2603c21fcc77f84c338ed8f03bd9639027c1e47475a09e4d2617aff5b695caf0915c36b59570e2572b64142dd76701c8ddc0fffd3

  • SSDEEP

    98304:MS/IP1tXjcvurtGm5Awv025ancWoTMcmMWnV:MS/81tTcvugm/s25LWtcrU

Malware Config

Targets

    • Target

      file.exe

    • Size

      4.2MB

    • MD5

      40cb4053a584486a21a109ffb44933c9

    • SHA1

      07a94039a6176646ecdb0a5b0fab59b632bdbd18

    • SHA256

      71b2a45658b6d8df33fc9bacc2c938ec598db52f8a477d859632d774802c0d84

    • SHA512

      58356679459f0c4126905cb2603c21fcc77f84c338ed8f03bd9639027c1e47475a09e4d2617aff5b695caf0915c36b59570e2572b64142dd76701c8ddc0fffd3

    • SSDEEP

      98304:MS/IP1tXjcvurtGm5Awv025ancWoTMcmMWnV:MS/81tTcvugm/s25LWtcrU

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.