General

  • Target

    5723e6dcfabbe7414fca6e33c3b8e3f0e42041cccbcafec6bf3c92655f2fcd22.exe

  • Size

    4.2MB

  • Sample

    241125-l9yygaxqgn

  • MD5

    4ff77a8216867eb296ee225205c991f7

  • SHA1

    3e87d253faac3768de7d5f335ace61b2c6d378ab

  • SHA256

    5723e6dcfabbe7414fca6e33c3b8e3f0e42041cccbcafec6bf3c92655f2fcd22

  • SHA512

    d87799cf0e282c250f599c7650a7c54635b22aa7367b8e3c815a3791606f1fdaef49c7a570f429c3d1ee62abb5aeeb0ca4ee064664cd309b95e9c87107f9cc4d

  • SSDEEP

    98304:w1h6bxB94hk9yMyHPPnUv68dc4BHSlAyitLDCSSbAl4Y8hoi7114UQX:w1gZKA/jSlkZDCXfYP/9X

Malware Config

Targets

    • Target

      5723e6dcfabbe7414fca6e33c3b8e3f0e42041cccbcafec6bf3c92655f2fcd22.exe

    • Size

      4.2MB

    • MD5

      4ff77a8216867eb296ee225205c991f7

    • SHA1

      3e87d253faac3768de7d5f335ace61b2c6d378ab

    • SHA256

      5723e6dcfabbe7414fca6e33c3b8e3f0e42041cccbcafec6bf3c92655f2fcd22

    • SHA512

      d87799cf0e282c250f599c7650a7c54635b22aa7367b8e3c815a3791606f1fdaef49c7a570f429c3d1ee62abb5aeeb0ca4ee064664cd309b95e9c87107f9cc4d

    • SSDEEP

      98304:w1h6bxB94hk9yMyHPPnUv68dc4BHSlAyitLDCSSbAl4Y8hoi7114UQX:w1gZKA/jSlkZDCXfYP/9X

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks