General
-
Target
7f86796ba277db70ce5d280c2a6f714c.bin
-
Size
4.2MB
-
Sample
241206-byhr1asrey
-
MD5
f22d5b8bffb17e6aec3804fb91dc070f
-
SHA1
f403fed52bcd714bf5dcec58bddcaa80d649a39f
-
SHA256
17c3123db77ffc211c028fa20138699f1d8cd8a63159d428dd1e33f5cb265b06
-
SHA512
31c429272211bd7340b5cd1c78cd08f30135a44cc7d2e686829c7b63b91053a84e7ea8bfa45290f983e2ffaee628c4c5ae0877b382f6ae211dc6adb13da23b55
-
SSDEEP
98304:EZZCPAAOqcg4RYAUSRLsj6L+i770P2iLDjO3cNIYaLmbyPkjqjoFnB:kCIfPUW+E78lDjOcV8rO3pB
Static task
static1
Behavioral task
behavioral1
Sample
6098007d86bda32edb4dbeac787639b623cca631501eba60d29042d5dfbee3ff.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
6098007d86bda32edb4dbeac787639b623cca631501eba60d29042d5dfbee3ff.exe
-
Size
4.2MB
-
MD5
7f86796ba277db70ce5d280c2a6f714c
-
SHA1
fed01f3abd8ff316007fea40970aa18bc3b996b6
-
SHA256
6098007d86bda32edb4dbeac787639b623cca631501eba60d29042d5dfbee3ff
-
SHA512
124a578cbe99d5747cfe8841c37e658d0670d558bc706f1b5bcd5543b57306c9ec355c6a6ffb541bc130d934efbae11a182c75f17037ad7d1154088f283b6703
-
SSDEEP
98304:JSqUC29OWJfBmDjM2COyYUAMWe5Xj9fQ0hEBJ8nwE/2M:J8OifBMjAODIzlQBBJ8nh2
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-