General
-
Target
file.exe
-
Size
4.3MB
-
Sample
241206-zpvxzasrhm
-
MD5
4500ada3f3ca96c5a4c012d41ecb92e6
-
SHA1
688d9fbf419423ec29c4037dc04a975475936c33
-
SHA256
e7a83ddae3eec8ce624fc138e1dddb7f3ff5c5c9f20db11f60e22f489bdcc947
-
SHA512
95102061505fa16f5bfe89d32001b75b4e353cd3fce2381045dbabb46db42299c8049bdec0e3b0dd376043c59a52f71e3e9d29fdd85c4b7db056697c1e4a50be
-
SSDEEP
98304:pJJUaXAY2JwKhR14eM+rNKNhuVEpTebunratQe7FOxz:fXn2JwreM71TebGra
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
file.exe
-
Size
4.3MB
-
MD5
4500ada3f3ca96c5a4c012d41ecb92e6
-
SHA1
688d9fbf419423ec29c4037dc04a975475936c33
-
SHA256
e7a83ddae3eec8ce624fc138e1dddb7f3ff5c5c9f20db11f60e22f489bdcc947
-
SHA512
95102061505fa16f5bfe89d32001b75b4e353cd3fce2381045dbabb46db42299c8049bdec0e3b0dd376043c59a52f71e3e9d29fdd85c4b7db056697c1e4a50be
-
SSDEEP
98304:pJJUaXAY2JwKhR14eM+rNKNhuVEpTebunratQe7FOxz:fXn2JwreM71TebGra
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-