General

  • Target

    9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09_Sigmanly

  • Size

    4.2MB

  • Sample

    241220-mlnm9svmas

  • MD5

    0ac83051d42c812a3deb74e093c48f9e

  • SHA1

    ef8dbb841cf66cb66eeefcd282baaa0544dd1fbd

  • SHA256

    9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09

  • SHA512

    ee04c5ff5f73156cacbb95a3d5d8aebd0e28a011aa46ffe800d2d3b50be16b88eff285e87494b2ec9fe664c7e6ab2124e405d9523a691d8a953aeb89617f5021

  • SSDEEP

    98304:gzUjg5FqNPOmOaa+KFi90WNEZsx2VeUsGkXM9Aby5fgkaZdX:25FqN0aKFoXMKgXsGHAu5fAd

Malware Config

Extracted

Family

cryptbot

Targets

    • Target

      9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09_Sigmanly

    • Size

      4.2MB

    • MD5

      0ac83051d42c812a3deb74e093c48f9e

    • SHA1

      ef8dbb841cf66cb66eeefcd282baaa0544dd1fbd

    • SHA256

      9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09

    • SHA512

      ee04c5ff5f73156cacbb95a3d5d8aebd0e28a011aa46ffe800d2d3b50be16b88eff285e87494b2ec9fe664c7e6ab2124e405d9523a691d8a953aeb89617f5021

    • SSDEEP

      98304:gzUjg5FqNPOmOaa+KFi90WNEZsx2VeUsGkXM9Aby5fgkaZdX:25FqN0aKFoXMKgXsGHAu5fAd

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks