General
-
Target
1f16e15ed40c117aa6468a9e79990e5cef926d0838cf1ce08d860ed6d092dee5
-
Size
4.3MB
-
Sample
241207-wkg9jaxmg1
-
MD5
ac0b9cd9364e29334c54bee967689b1a
-
SHA1
074a6e83089aa60a5d05e5f0f3cb52dd98d01b08
-
SHA256
1f16e15ed40c117aa6468a9e79990e5cef926d0838cf1ce08d860ed6d092dee5
-
SHA512
9940a237e9b2b14c1e853799b47855c467c83cc86487e96a0124fa70a8bc6f2f73d7393debb43ddf0a0b344974c1f725d0136712837050fddfd2f901f587be4d
-
SSDEEP
98304:1Hcj5o18s0lBN5K0kXMp6oTEZ7ser3FvUbudYwUD:mj5o18rBNk0kXeK7ser3uyG
Static task
static1
Behavioral task
behavioral1
Sample
1f16e15ed40c117aa6468a9e79990e5cef926d0838cf1ce08d860ed6d092dee5.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
1f16e15ed40c117aa6468a9e79990e5cef926d0838cf1ce08d860ed6d092dee5
-
Size
4.3MB
-
MD5
ac0b9cd9364e29334c54bee967689b1a
-
SHA1
074a6e83089aa60a5d05e5f0f3cb52dd98d01b08
-
SHA256
1f16e15ed40c117aa6468a9e79990e5cef926d0838cf1ce08d860ed6d092dee5
-
SHA512
9940a237e9b2b14c1e853799b47855c467c83cc86487e96a0124fa70a8bc6f2f73d7393debb43ddf0a0b344974c1f725d0136712837050fddfd2f901f587be4d
-
SSDEEP
98304:1Hcj5o18s0lBN5K0kXMp6oTEZ7ser3FvUbudYwUD:mj5o18rBNk0kXeK7ser3uyG
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-