General

  • Target

    4500ada3f3ca96c5a4c012d41ecb92e6.bin

  • Size

    4.2MB

  • Sample

    241208-blrt5stqh1

  • MD5

    8157ae4ed445322f2ff709087f02b678

  • SHA1

    b7eb06a3101f34740915cbaa4833f8d7f33ab690

  • SHA256

    5b20e07add53d7cf4424b76659fa40c7d3617fd9cf64662608efda14123e6c77

  • SHA512

    6b46c88ea117f9dd97b3aaea17a7b75e60be3a8c0abc963c14f25e3eb2a5e73b10c5ef44eb24d52fef8d3ff283b9c5ba75b54515444c0b64f72c201aeb7bdf99

  • SSDEEP

    98304:tB2hZIS1i6YU/4TFJIo0dykJQiuiF7TxGk3K73ZchFbdFqpi0:t0RkhF6ouQ1ifrZ4pi0

Malware Config

Extracted

Family

cryptbot

Targets

    • Target

      e7a83ddae3eec8ce624fc138e1dddb7f3ff5c5c9f20db11f60e22f489bdcc947.exe

    • Size

      4.3MB

    • MD5

      4500ada3f3ca96c5a4c012d41ecb92e6

    • SHA1

      688d9fbf419423ec29c4037dc04a975475936c33

    • SHA256

      e7a83ddae3eec8ce624fc138e1dddb7f3ff5c5c9f20db11f60e22f489bdcc947

    • SHA512

      95102061505fa16f5bfe89d32001b75b4e353cd3fce2381045dbabb46db42299c8049bdec0e3b0dd376043c59a52f71e3e9d29fdd85c4b7db056697c1e4a50be

    • SSDEEP

      98304:pJJUaXAY2JwKhR14eM+rNKNhuVEpTebunratQe7FOxz:fXn2JwreM71TebGra

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks