General

  • Target

    572db7adb908684deed9efdafd67b3bf601203d5f5fc7836403ceb713c6a3777.exe

  • Size

    4.2MB

  • Sample

    241125-cxgc8atkfx

  • MD5

    6f3abf72b45579ad895e717f3725d31d

  • SHA1

    a6117b18c33237012d24a646594e38109a368c5d

  • SHA256

    572db7adb908684deed9efdafd67b3bf601203d5f5fc7836403ceb713c6a3777

  • SHA512

    77fc4968078b509206940e19c295bfab4f459cb1bc0ebb4b1a7e21eb72c6a2758581553bf3260cbf11ef25ed8f93670d06fd95f605826501f948612f82899958

  • SSDEEP

    98304:rbZE67NfqqvnyjS+YxDSFC0r1m8SZcZdZJroTqkgnb5mRq287uV:h9B5PyjS+YxDSFC0rHSWZ3VoTqkS5c6u

Malware Config

Targets

    • Target

      572db7adb908684deed9efdafd67b3bf601203d5f5fc7836403ceb713c6a3777.exe

    • Size

      4.2MB

    • MD5

      6f3abf72b45579ad895e717f3725d31d

    • SHA1

      a6117b18c33237012d24a646594e38109a368c5d

    • SHA256

      572db7adb908684deed9efdafd67b3bf601203d5f5fc7836403ceb713c6a3777

    • SHA512

      77fc4968078b509206940e19c295bfab4f459cb1bc0ebb4b1a7e21eb72c6a2758581553bf3260cbf11ef25ed8f93670d06fd95f605826501f948612f82899958

    • SSDEEP

      98304:rbZE67NfqqvnyjS+YxDSFC0r1m8SZcZdZJroTqkgnb5mRq287uV:h9B5PyjS+YxDSFC0rHSWZ3VoTqkS5c6u

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks