General
-
Target
ada89f570fc90952b5a2a384b6379efa1e80a7a9165a51e14e6ea611131b7f82.exe
-
Size
4.2MB
-
Sample
241206-dmbknatjdl
-
MD5
945c341f59701ed5ba77d32113380608
-
SHA1
7f4731907303469979510815377be0afe5eba8b6
-
SHA256
ada89f570fc90952b5a2a384b6379efa1e80a7a9165a51e14e6ea611131b7f82
-
SHA512
55dd9513f574183948d6195954c4818842451f5137f336decbd04b42e99e757286e45e3b70837affa73912926338b761ab7623857f6f8d5ee346abe621598f55
-
SSDEEP
98304:idJr9sU6IusvnxunM1YClKBIikBA4RmNpxbr7tozI3Lxtq4P2r9uO:i3psU6lTM11l6XkR0v/i03LH92rQ
Static task
static1
Behavioral task
behavioral1
Sample
ada89f570fc90952b5a2a384b6379efa1e80a7a9165a51e14e6ea611131b7f82.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
ada89f570fc90952b5a2a384b6379efa1e80a7a9165a51e14e6ea611131b7f82.exe
-
Size
4.2MB
-
MD5
945c341f59701ed5ba77d32113380608
-
SHA1
7f4731907303469979510815377be0afe5eba8b6
-
SHA256
ada89f570fc90952b5a2a384b6379efa1e80a7a9165a51e14e6ea611131b7f82
-
SHA512
55dd9513f574183948d6195954c4818842451f5137f336decbd04b42e99e757286e45e3b70837affa73912926338b761ab7623857f6f8d5ee346abe621598f55
-
SSDEEP
98304:idJr9sU6IusvnxunM1YClKBIikBA4RmNpxbr7tozI3Lxtq4P2r9uO:i3psU6lTM11l6XkR0v/i03LH92rQ
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-