General
-
Target
9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09_Sigmanly
-
Size
4.2MB
-
Sample
241220-mlnm9svmas
-
MD5
0ac83051d42c812a3deb74e093c48f9e
-
SHA1
ef8dbb841cf66cb66eeefcd282baaa0544dd1fbd
-
SHA256
9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09
-
SHA512
ee04c5ff5f73156cacbb95a3d5d8aebd0e28a011aa46ffe800d2d3b50be16b88eff285e87494b2ec9fe664c7e6ab2124e405d9523a691d8a953aeb89617f5021
-
SSDEEP
98304:gzUjg5FqNPOmOaa+KFi90WNEZsx2VeUsGkXM9Aby5fgkaZdX:25FqN0aKFoXMKgXsGHAu5fAd
Static task
static1
Behavioral task
behavioral1
Sample
9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09_Sigmanly.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09_Sigmanly
-
Size
4.2MB
-
MD5
0ac83051d42c812a3deb74e093c48f9e
-
SHA1
ef8dbb841cf66cb66eeefcd282baaa0544dd1fbd
-
SHA256
9efc2d4a5f40a0bf856d84858ba422d4c504a276f03fa87aec827f266726ce09
-
SHA512
ee04c5ff5f73156cacbb95a3d5d8aebd0e28a011aa46ffe800d2d3b50be16b88eff285e87494b2ec9fe664c7e6ab2124e405d9523a691d8a953aeb89617f5021
-
SSDEEP
98304:gzUjg5FqNPOmOaa+KFi90WNEZsx2VeUsGkXM9Aby5fgkaZdX:25FqN0aKFoXMKgXsGHAu5fAd
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-