General
-
Target
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe
-
Size
4.2MB
-
Sample
241124-cy8h4awjhl
-
MD5
8009fa9b3f6b5b95575a83c2f487f515
-
SHA1
df618866e5939f420342d3fe1007f4bad31ce2aa
-
SHA256
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf
-
SHA512
31be4e0e5631f6525e3312bc565348097ae7100c30312d28dafe42a647af782ac53bcc1766f91040c8ac986e70c28e98ab9a706d885c37866eadec5ccc5d41b5
-
SSDEEP
98304:MzFe3hXc4HwYlfLsIHQrFjWpamuAKapcR4es7wdCbunL:wiLHwYlQ56afOGE7wkM
Static task
static1
Behavioral task
behavioral1
Sample
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe
-
Size
4.2MB
-
MD5
8009fa9b3f6b5b95575a83c2f487f515
-
SHA1
df618866e5939f420342d3fe1007f4bad31ce2aa
-
SHA256
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf
-
SHA512
31be4e0e5631f6525e3312bc565348097ae7100c30312d28dafe42a647af782ac53bcc1766f91040c8ac986e70c28e98ab9a706d885c37866eadec5ccc5d41b5
-
SSDEEP
98304:MzFe3hXc4HwYlfLsIHQrFjWpamuAKapcR4es7wdCbunL:wiLHwYlQ56afOGE7wkM
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1