General
-
Target
2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe
-
Size
2.7MB
-
Sample
241122-24kfws1qgv
-
MD5
e79bd7a1ea4413bfebd391b86f54893c
-
SHA1
e965a062e9eadfb2d3121362942310cfd32f3afb
-
SHA256
2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483
-
SHA512
e85f61470100ee3c9d0bb80fd7d71757c6c4e41268f0ea05d392873a2aca4d3515a288baa11c33274383c17bb9b34d0d9e05d55b4959f5017a9981c00b4a1c1e
-
SSDEEP
49152:MNPPzVce7Xp9pbK3oRVZPDEb4jf/fFeIKnGQ+Z+/u4ae8aMSSKtarkgjP2jx:MNDVcebprK4RVZAqXfFeznGgahSLt2Yx
Behavioral task
behavioral1
Sample
2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
veotdm61.top
morizu06.top
-
payload_url
http://tynpdi08.top/download.php?file=loungy.exe
Targets
-
-
Target
2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe
-
Size
2.7MB
-
MD5
e79bd7a1ea4413bfebd391b86f54893c
-
SHA1
e965a062e9eadfb2d3121362942310cfd32f3afb
-
SHA256
2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483
-
SHA512
e85f61470100ee3c9d0bb80fd7d71757c6c4e41268f0ea05d392873a2aca4d3515a288baa11c33274383c17bb9b34d0d9e05d55b4959f5017a9981c00b4a1c1e
-
SSDEEP
49152:MNPPzVce7Xp9pbK3oRVZPDEb4jf/fFeIKnGQ+Z+/u4ae8aMSSKtarkgjP2jx:MNDVcebprK4RVZAqXfFeznGgahSLt2Yx
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2