General

  • Target

    c1673b575277e0d0a5b6a58c7c71b8c7e973f51dbeb9e682562a5ec447724d04.exe

  • Size

    4.2MB

  • Sample

    241121-j65kqsvlal

  • MD5

    d55a94d4acedebc4b42333312be08f6b

  • SHA1

    ec5da148a43839accda27c01e221b128777602fe

  • SHA256

    c1673b575277e0d0a5b6a58c7c71b8c7e973f51dbeb9e682562a5ec447724d04

  • SHA512

    d2612761dc8ed8bf29f06d7ef18b88015d6ea568c9faecb2196df030a71b09f5a30f69551ba7c06ee4dac2e052bf82f43581a56559ccc078769e1f81119359be

  • SSDEEP

    98304:KcDNgmsfZF25zmE4LQG+z9rsczfav3A2lz+uxHUhZa47OOQ:xDNgmCZicQG+9sMA/lz+zzOOQ

Malware Config

Targets

    • Target

      c1673b575277e0d0a5b6a58c7c71b8c7e973f51dbeb9e682562a5ec447724d04.exe

    • Size

      4.2MB

    • MD5

      d55a94d4acedebc4b42333312be08f6b

    • SHA1

      ec5da148a43839accda27c01e221b128777602fe

    • SHA256

      c1673b575277e0d0a5b6a58c7c71b8c7e973f51dbeb9e682562a5ec447724d04

    • SHA512

      d2612761dc8ed8bf29f06d7ef18b88015d6ea568c9faecb2196df030a71b09f5a30f69551ba7c06ee4dac2e052bf82f43581a56559ccc078769e1f81119359be

    • SSDEEP

      98304:KcDNgmsfZF25zmE4LQG+z9rsczfav3A2lz+uxHUhZa47OOQ:xDNgmCZicQG+9sMA/lz+zzOOQ

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks