General

  • Target

    72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe

  • Size

    4.2MB

  • Sample

    241124-cvpa2svqhj

  • MD5

    8009fa9b3f6b5b95575a83c2f487f515

  • SHA1

    df618866e5939f420342d3fe1007f4bad31ce2aa

  • SHA256

    72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf

  • SHA512

    31be4e0e5631f6525e3312bc565348097ae7100c30312d28dafe42a647af782ac53bcc1766f91040c8ac986e70c28e98ab9a706d885c37866eadec5ccc5d41b5

  • SSDEEP

    98304:MzFe3hXc4HwYlfLsIHQrFjWpamuAKapcR4es7wdCbunL:wiLHwYlQ56afOGE7wkM

Malware Config

Targets

    • Target

      72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe

    • Size

      4.2MB

    • MD5

      8009fa9b3f6b5b95575a83c2f487f515

    • SHA1

      df618866e5939f420342d3fe1007f4bad31ce2aa

    • SHA256

      72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf

    • SHA512

      31be4e0e5631f6525e3312bc565348097ae7100c30312d28dafe42a647af782ac53bcc1766f91040c8ac986e70c28e98ab9a706d885c37866eadec5ccc5d41b5

    • SSDEEP

      98304:MzFe3hXc4HwYlfLsIHQrFjWpamuAKapcR4es7wdCbunL:wiLHwYlQ56afOGE7wkM

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks