General
-
Target
4500ada3f3ca96c5a4c012d41ecb92e6.bin
-
Size
4.2MB
-
Sample
241208-blrt5stqh1
-
MD5
8157ae4ed445322f2ff709087f02b678
-
SHA1
b7eb06a3101f34740915cbaa4833f8d7f33ab690
-
SHA256
5b20e07add53d7cf4424b76659fa40c7d3617fd9cf64662608efda14123e6c77
-
SHA512
6b46c88ea117f9dd97b3aaea17a7b75e60be3a8c0abc963c14f25e3eb2a5e73b10c5ef44eb24d52fef8d3ff283b9c5ba75b54515444c0b64f72c201aeb7bdf99
-
SSDEEP
98304:tB2hZIS1i6YU/4TFJIo0dykJQiuiF7TxGk3K73ZchFbdFqpi0:t0RkhF6ouQ1ifrZ4pi0
Static task
static1
Behavioral task
behavioral1
Sample
e7a83ddae3eec8ce624fc138e1dddb7f3ff5c5c9f20db11f60e22f489bdcc947.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
e7a83ddae3eec8ce624fc138e1dddb7f3ff5c5c9f20db11f60e22f489bdcc947.exe
-
Size
4.3MB
-
MD5
4500ada3f3ca96c5a4c012d41ecb92e6
-
SHA1
688d9fbf419423ec29c4037dc04a975475936c33
-
SHA256
e7a83ddae3eec8ce624fc138e1dddb7f3ff5c5c9f20db11f60e22f489bdcc947
-
SHA512
95102061505fa16f5bfe89d32001b75b4e353cd3fce2381045dbabb46db42299c8049bdec0e3b0dd376043c59a52f71e3e9d29fdd85c4b7db056697c1e4a50be
-
SSDEEP
98304:pJJUaXAY2JwKhR14eM+rNKNhuVEpTebunratQe7FOxz:fXn2JwreM71TebGra
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-