General
-
Target
843567bec6b0f3cbace108b441cc48a352e085ddf485bc04ed47947fe759369b.exe
-
Size
4.2MB
-
Sample
241206-dc8gmssncl
-
MD5
758ff78dfb784d7dd45d64c3414e65ab
-
SHA1
8867b7267b58752190b99bf8203305b2d3f88b27
-
SHA256
843567bec6b0f3cbace108b441cc48a352e085ddf485bc04ed47947fe759369b
-
SHA512
60c189db28534c4e7fd0ed7ef7283a1baae4d038c27a1ce724c0a06dbe2e66dac55ae4d66d5639ca51b5df7a3cae2bcb3a9358d90587323c4e3acbd43b07aeb1
-
SSDEEP
98304:ZgD6W88E9Cu++d9vk5oIjl2KU0j5cinV+C8OsT/T:mOZCu++Gl2Kj5c2V+Cq
Static task
static1
Behavioral task
behavioral1
Sample
843567bec6b0f3cbace108b441cc48a352e085ddf485bc04ed47947fe759369b.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
843567bec6b0f3cbace108b441cc48a352e085ddf485bc04ed47947fe759369b.exe
-
Size
4.2MB
-
MD5
758ff78dfb784d7dd45d64c3414e65ab
-
SHA1
8867b7267b58752190b99bf8203305b2d3f88b27
-
SHA256
843567bec6b0f3cbace108b441cc48a352e085ddf485bc04ed47947fe759369b
-
SHA512
60c189db28534c4e7fd0ed7ef7283a1baae4d038c27a1ce724c0a06dbe2e66dac55ae4d66d5639ca51b5df7a3cae2bcb3a9358d90587323c4e3acbd43b07aeb1
-
SSDEEP
98304:ZgD6W88E9Cu++d9vk5oIjl2KU0j5cinV+C8OsT/T:mOZCu++Gl2Kj5c2V+Cq
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-