General

  • Target

    f5f5df82e2aba185b0fe5bc31a8d9099b7af4065809f10ecc3a6569608cff42b.exe

  • Size

    4.2MB

  • Sample

    241122-kqnsqaxpdt

  • MD5

    7a4d10694081bd5bc1a81f5f7ebc6177

  • SHA1

    7b596c9f90bfb3efff0a3de0e07ccb87c5b4ee28

  • SHA256

    f5f5df82e2aba185b0fe5bc31a8d9099b7af4065809f10ecc3a6569608cff42b

  • SHA512

    886d428c90e701b2bdfaeb3a9c682c15fe87a8ebff782a1a99aa68e09541035cfc5d310d3f74a0189deb7e69710e57e5562128ee6c8fd66106f7f80f1d7058ca

  • SSDEEP

    98304:0Fjad1G+OLu0LP2vD2NuxY2dTpA6IjitYebny:0JKs+OLu0bUxY6dnmiqsy

Malware Config

Targets

    • Target

      f5f5df82e2aba185b0fe5bc31a8d9099b7af4065809f10ecc3a6569608cff42b.exe

    • Size

      4.2MB

    • MD5

      7a4d10694081bd5bc1a81f5f7ebc6177

    • SHA1

      7b596c9f90bfb3efff0a3de0e07ccb87c5b4ee28

    • SHA256

      f5f5df82e2aba185b0fe5bc31a8d9099b7af4065809f10ecc3a6569608cff42b

    • SHA512

      886d428c90e701b2bdfaeb3a9c682c15fe87a8ebff782a1a99aa68e09541035cfc5d310d3f74a0189deb7e69710e57e5562128ee6c8fd66106f7f80f1d7058ca

    • SSDEEP

      98304:0Fjad1G+OLu0LP2vD2NuxY2dTpA6IjitYebny:0JKs+OLu0bUxY6dnmiqsy

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks