General
-
Target
f822440531c2c4690bcc6c52d4baaea3e56ca9008726cfe55c123931d27f545f
-
Size
4.2MB
-
Sample
241218-nc91ksxpfm
-
MD5
724c47eb0c466e28d03fdbbeab283448
-
SHA1
db4ab5dedfe960b259323c49d31b5cf6a2f68c9c
-
SHA256
f822440531c2c4690bcc6c52d4baaea3e56ca9008726cfe55c123931d27f545f
-
SHA512
6d3059018a7b8ad358002d15de71439af3db6107396a9845e18aa7c3f9e67faa5285e1c87788b62b9ddeda24b0432c7b28432e03b6bb138b25cc9080a5347009
-
SSDEEP
98304:fvikcoErkd+Atd63J0jzPGg4ZbGD3M3qseTUoZ7eU:fqF7K+c2mzug9zMQTUC7eU
Static task
static1
Behavioral task
behavioral1
Sample
f822440531c2c4690bcc6c52d4baaea3e56ca9008726cfe55c123931d27f545f.exe
Resource
win7-20241010-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
f822440531c2c4690bcc6c52d4baaea3e56ca9008726cfe55c123931d27f545f
-
Size
4.2MB
-
MD5
724c47eb0c466e28d03fdbbeab283448
-
SHA1
db4ab5dedfe960b259323c49d31b5cf6a2f68c9c
-
SHA256
f822440531c2c4690bcc6c52d4baaea3e56ca9008726cfe55c123931d27f545f
-
SHA512
6d3059018a7b8ad358002d15de71439af3db6107396a9845e18aa7c3f9e67faa5285e1c87788b62b9ddeda24b0432c7b28432e03b6bb138b25cc9080a5347009
-
SSDEEP
98304:fvikcoErkd+Atd63J0jzPGg4ZbGD3M3qseTUoZ7eU:fqF7K+c2mzug9zMQTUC7eU
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-