General

  • Target

    ec85e681b765cf685363a2aa3a5b8a86837d0d8923d2ecba7b35e67d74b29265.exe

  • Size

    4.2MB

  • Sample

    241126-d5x7daypgl

  • MD5

    88d3b1255894e7039c67b2272b3386df

  • SHA1

    84fd4519dbb0270ca681451ca7092b8e803677bf

  • SHA256

    ec85e681b765cf685363a2aa3a5b8a86837d0d8923d2ecba7b35e67d74b29265

  • SHA512

    c6f51d6ca7e9002a4a7806d347f91b3a17d70926a9d34971a07a40fe2121593469ae8388c47f0c2abbc9f3e29329f39b01ca7a07fd5b55c2d86260d4f4d514ac

  • SSDEEP

    98304:6xzN1ubGXKM4lbptXERRspQND8nRM6keUQSuq11aN4ch:m/atLtmKQNDA+6keUcuc

Malware Config

Targets

    • Target

      ec85e681b765cf685363a2aa3a5b8a86837d0d8923d2ecba7b35e67d74b29265.exe

    • Size

      4.2MB

    • MD5

      88d3b1255894e7039c67b2272b3386df

    • SHA1

      84fd4519dbb0270ca681451ca7092b8e803677bf

    • SHA256

      ec85e681b765cf685363a2aa3a5b8a86837d0d8923d2ecba7b35e67d74b29265

    • SHA512

      c6f51d6ca7e9002a4a7806d347f91b3a17d70926a9d34971a07a40fe2121593469ae8388c47f0c2abbc9f3e29329f39b01ca7a07fd5b55c2d86260d4f4d514ac

    • SSDEEP

      98304:6xzN1ubGXKM4lbptXERRspQND8nRM6keUQSuq11aN4ch:m/atLtmKQNDA+6keUcuc

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Detects CryptBot payload

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.