General

  • Target

    bbba491abc5c69486fa59fb1e1b5ddc5d3942a107ac8e149795b55e66e3f0111.exe

  • Size

    4.2MB

  • Sample

    241122-dnrchatkhx

  • MD5

    1a688ed7f5d7ce8f0155133ad0a2e60d

  • SHA1

    7a71b0ee7f99ca9e0b61b105ce9fd8478012c19b

  • SHA256

    bbba491abc5c69486fa59fb1e1b5ddc5d3942a107ac8e149795b55e66e3f0111

  • SHA512

    512961729a2aafa06d778b779ad46891b2247e14530919177aad184a1e3589d5b5993b1dadae16af69680942e64af0c2088ee1852a725a2b47151e94f62cc9e9

  • SSDEEP

    98304:f4wYhv9iDFo5Gub/Tz763K5azyPXp+KWQ0psRE:f4wE9Yu5pvz7n5azIABHsR

Malware Config

Targets

    • Target

      bbba491abc5c69486fa59fb1e1b5ddc5d3942a107ac8e149795b55e66e3f0111.exe

    • Size

      4.2MB

    • MD5

      1a688ed7f5d7ce8f0155133ad0a2e60d

    • SHA1

      7a71b0ee7f99ca9e0b61b105ce9fd8478012c19b

    • SHA256

      bbba491abc5c69486fa59fb1e1b5ddc5d3942a107ac8e149795b55e66e3f0111

    • SHA512

      512961729a2aafa06d778b779ad46891b2247e14530919177aad184a1e3589d5b5993b1dadae16af69680942e64af0c2088ee1852a725a2b47151e94f62cc9e9

    • SSDEEP

      98304:f4wYhv9iDFo5Gub/Tz763K5azyPXp+KWQ0psRE:f4wE9Yu5pvz7n5azIABHsR

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks