General
-
Target
df6ba8269d9aab412a1d4817dd93c5bba88c9d1baf1f3752ed7b47c47e2dfdf8.exe
-
Size
4.2MB
-
Sample
241124-dbtl4azqdx
-
MD5
f97c2e9f72376f61f1d70cf0f4315e20
-
SHA1
2275dab7414471d6f71bc0d7b9904f1c28109665
-
SHA256
df6ba8269d9aab412a1d4817dd93c5bba88c9d1baf1f3752ed7b47c47e2dfdf8
-
SHA512
208f4779c57e285f9e458ff01b0ecc40792ad36e90872a203ca7206c531e773b1d523acc46f0466e88f732b79ebe5a5a14de9c959f9b01c4310cf13c9633b18a
-
SSDEEP
98304:Axdqr/2OzBrLdrPtIf9ZE6b7n9fmWZfoqHBJQ:AxdqzZtxrPtIfvE6HnXZLS
Static task
static1
Behavioral task
behavioral1
Sample
df6ba8269d9aab412a1d4817dd93c5bba88c9d1baf1f3752ed7b47c47e2dfdf8.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
df6ba8269d9aab412a1d4817dd93c5bba88c9d1baf1f3752ed7b47c47e2dfdf8.exe
-
Size
4.2MB
-
MD5
f97c2e9f72376f61f1d70cf0f4315e20
-
SHA1
2275dab7414471d6f71bc0d7b9904f1c28109665
-
SHA256
df6ba8269d9aab412a1d4817dd93c5bba88c9d1baf1f3752ed7b47c47e2dfdf8
-
SHA512
208f4779c57e285f9e458ff01b0ecc40792ad36e90872a203ca7206c531e773b1d523acc46f0466e88f732b79ebe5a5a14de9c959f9b01c4310cf13c9633b18a
-
SSDEEP
98304:Axdqr/2OzBrLdrPtIf9ZE6b7n9fmWZfoqHBJQ:AxdqzZtxrPtIfvE6HnXZLS
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1