General
-
Target
d6cfec5f8c250d92d751030c95d46aec.exe
-
Size
4.3MB
-
Sample
241219-jbfywsvmcy
-
MD5
d6cfec5f8c250d92d751030c95d46aec
-
SHA1
70439cf2611f97c84af487c44b88703d004a2bca
-
SHA256
0200c5657794ccc0916aae772004b7f72a793b77dc807b51b2f88e597813f611
-
SHA512
a939f9af174d37e3d32d0794b1f14110deffd7847b884a79b5fd300bcc7c30ce285f6dbbc41ad6ab5bd237bb6353efb7ddee903a8ec155a10840dec8c25d9bbb
-
SSDEEP
98304:DsLQssV45wdVMBWQmIXnmZ27vSBKm/P1QBlQSr9K1GBIP:epgMBbmYmqv+KuPylZr9pBu
Static task
static1
Behavioral task
behavioral1
Sample
d6cfec5f8c250d92d751030c95d46aec.exe
Resource
win7-20240729-en
Malware Config
Extracted
cryptbot
http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734
Targets
-
-
Target
d6cfec5f8c250d92d751030c95d46aec.exe
-
Size
4.3MB
-
MD5
d6cfec5f8c250d92d751030c95d46aec
-
SHA1
70439cf2611f97c84af487c44b88703d004a2bca
-
SHA256
0200c5657794ccc0916aae772004b7f72a793b77dc807b51b2f88e597813f611
-
SHA512
a939f9af174d37e3d32d0794b1f14110deffd7847b884a79b5fd300bcc7c30ce285f6dbbc41ad6ab5bd237bb6353efb7ddee903a8ec155a10840dec8c25d9bbb
-
SSDEEP
98304:DsLQssV45wdVMBWQmIXnmZ27vSBKm/P1QBlQSr9K1GBIP:epgMBbmYmqv+KuPylZr9pBu
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-