General
-
Target
7a6a70f757a80f5198b839b6652f0f17c7d649890e47b7cd5c617b89b2e441ec.exe
-
Size
4.2MB
-
Sample
241124-ne4atatjgp
-
MD5
92c3e1b226548c5798cbb0666efb5fef
-
SHA1
ef026aa19b5ed70ce914cef49d4bfd3a94fab149
-
SHA256
7a6a70f757a80f5198b839b6652f0f17c7d649890e47b7cd5c617b89b2e441ec
-
SHA512
1b1192d5336999afc199f399bf3fe84af895aa752536463dc123f54097a7cb31f00d006a1fb7dadcc5e3a782a6c6d6edb37714fe4c3b294e91628ace06451768
-
SSDEEP
98304:pjb1pKkbLTVlTHEQIv20WplE/CSXYqxkp3sHf/dmsp5bs6gcoJQp:R1UMV1EQCPWplOLXYqGMf/dmW5bpIJQp
Static task
static1
Behavioral task
behavioral1
Sample
7a6a70f757a80f5198b839b6652f0f17c7d649890e47b7cd5c617b89b2e441ec.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
7a6a70f757a80f5198b839b6652f0f17c7d649890e47b7cd5c617b89b2e441ec.exe
-
Size
4.2MB
-
MD5
92c3e1b226548c5798cbb0666efb5fef
-
SHA1
ef026aa19b5ed70ce914cef49d4bfd3a94fab149
-
SHA256
7a6a70f757a80f5198b839b6652f0f17c7d649890e47b7cd5c617b89b2e441ec
-
SHA512
1b1192d5336999afc199f399bf3fe84af895aa752536463dc123f54097a7cb31f00d006a1fb7dadcc5e3a782a6c6d6edb37714fe4c3b294e91628ace06451768
-
SSDEEP
98304:pjb1pKkbLTVlTHEQIv20WplE/CSXYqxkp3sHf/dmsp5bs6gcoJQp:R1UMV1EQCPWplOLXYqGMf/dmW5bpIJQp
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1