General

  • Target

    RA1YW_file.exe

  • Size

    4.3MB

  • Sample

    241205-pz49aavncz

  • MD5

    72950603b12d5d99f2ebcedeb3aed5d6

  • SHA1

    3587c298d27279b481f9efa0c02be575b6a06599

  • SHA256

    76d86e157a4fa1f1b3abf649b931cdc91af733e2b50a863cc9a1dcbb131148b4

  • SHA512

    1fbcb1f8793eab0107924f6ec8789eb1752fd39eb4683193b6962803911abbb7ff1d05a362dec349c768e656f7f84144150b06a35e13f74d60afe422cbb407c8

  • SSDEEP

    98304:f7GBXgWNPrFM6tSwBprLlYHt072IjqTSfvlheYEoMReoPDZhn/FRS:DwgWDMQBpPl1KIjzvXezosTDZv

Malware Config

Extracted

Family

cryptbot

Targets

    • Target

      RA1YW_file.exe

    • Size

      4.3MB

    • MD5

      72950603b12d5d99f2ebcedeb3aed5d6

    • SHA1

      3587c298d27279b481f9efa0c02be575b6a06599

    • SHA256

      76d86e157a4fa1f1b3abf649b931cdc91af733e2b50a863cc9a1dcbb131148b4

    • SHA512

      1fbcb1f8793eab0107924f6ec8789eb1752fd39eb4683193b6962803911abbb7ff1d05a362dec349c768e656f7f84144150b06a35e13f74d60afe422cbb407c8

    • SSDEEP

      98304:f7GBXgWNPrFM6tSwBprLlYHt072IjqTSfvlheYEoMReoPDZhn/FRS:DwgWDMQBpPl1KIjzvXezosTDZv

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks