General

  • Target

    4ba3ca651abc2a2b457d128db67aadbc24b9ce55354643cd5d9fd541a67abcf6.exe

  • Size

    4.2MB

  • Sample

    241124-cn68aaynev

  • MD5

    3db3772a8fe7ee091f20b20660559b56

  • SHA1

    561dead86e068f55eb1858be78f41aec43498cb9

  • SHA256

    4ba3ca651abc2a2b457d128db67aadbc24b9ce55354643cd5d9fd541a67abcf6

  • SHA512

    55bb734ea76f0ea188d5d4f519e32059de50e3b2e15403d57ec7a077c4c0d60618d0854d0290efb4127a3803d1375924412cbf34a1d30635151844090387d605

  • SSDEEP

    98304:pjb1pKkbLTVlTHEQIv20WplE/CSXYqxkp3sHf/dmsp5bs6gcoJQ:R1UMV1EQCPWplOLXYqGMf/dmW5bpIJQ

Malware Config

Targets

    • Target

      4ba3ca651abc2a2b457d128db67aadbc24b9ce55354643cd5d9fd541a67abcf6.exe

    • Size

      4.2MB

    • MD5

      3db3772a8fe7ee091f20b20660559b56

    • SHA1

      561dead86e068f55eb1858be78f41aec43498cb9

    • SHA256

      4ba3ca651abc2a2b457d128db67aadbc24b9ce55354643cd5d9fd541a67abcf6

    • SHA512

      55bb734ea76f0ea188d5d4f519e32059de50e3b2e15403d57ec7a077c4c0d60618d0854d0290efb4127a3803d1375924412cbf34a1d30635151844090387d605

    • SSDEEP

      98304:pjb1pKkbLTVlTHEQIv20WplE/CSXYqxkp3sHf/dmsp5bs6gcoJQ:R1UMV1EQCPWplOLXYqGMf/dmW5bpIJQ

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks