General

  • Target

    0e61adc0a3949a83b59cdbb9d9a7b8beee5227f3f01925d21896d13eb174b008.exe

  • Size

    4.2MB

  • Sample

    241206-vls7ratlfk

  • MD5

    693dcc353a947bd957a04f7adb1f1bc9

  • SHA1

    a2a571a10fe48174ac2f6702f385e4da88890b2c

  • SHA256

    0e61adc0a3949a83b59cdbb9d9a7b8beee5227f3f01925d21896d13eb174b008

  • SHA512

    29284d18371dc32a2e6c8576da0b035035e5c24a1d7b86d5f716d7b46193486705375d339cc0bb45c1f8945d408c251d68f5a6e37fee0e2b9549afd2e43f8c14

  • SSDEEP

    98304:syDDhFy941aPHMuUnd3Geok/euJHZC+fEzGUJkfdCwgJrfj:syXhF84MPMPnu8nHZC+8zGUJkMwgZ

Malware Config

Extracted

Family

cryptbot

Targets

    • Target

      0e61adc0a3949a83b59cdbb9d9a7b8beee5227f3f01925d21896d13eb174b008.exe

    • Size

      4.2MB

    • MD5

      693dcc353a947bd957a04f7adb1f1bc9

    • SHA1

      a2a571a10fe48174ac2f6702f385e4da88890b2c

    • SHA256

      0e61adc0a3949a83b59cdbb9d9a7b8beee5227f3f01925d21896d13eb174b008

    • SHA512

      29284d18371dc32a2e6c8576da0b035035e5c24a1d7b86d5f716d7b46193486705375d339cc0bb45c1f8945d408c251d68f5a6e37fee0e2b9549afd2e43f8c14

    • SSDEEP

      98304:syDDhFy941aPHMuUnd3Geok/euJHZC+fEzGUJkfdCwgJrfj:syXhF84MPMPnu8nHZC+8zGUJkMwgZ

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks