General
-
Target
0924a04e22be1339356c24b69b2e75516c56b0b23aa500e9068b9c28c54dd5b9_Sigmanly
-
Size
4.3MB
-
Sample
241221-lng3tsxmbv
-
MD5
84e0e622857460da96501532a233c862
-
SHA1
a83b246ef32b7a66a8cbbc54edd3bb667f956b9b
-
SHA256
0924a04e22be1339356c24b69b2e75516c56b0b23aa500e9068b9c28c54dd5b9
-
SHA512
db686ccaa7ed5c1707f18a9482257ad1b1f9101be0d3e975b4aa18f6eec5ed1860aa881b21f9c8265a0ac58c39becf433fff98de874c364b9953eb542f12d1ce
-
SSDEEP
98304:Sbmf0HEYlXEh8T9Vp33Jp5JdJ9PRpyOnb+tQUAFPJNpzBgyX2+HlDuAw8TV:MrkYtK8Z33ZpX3tndnqCPDFGW2UUMp
Static task
static1
Behavioral task
behavioral1
Sample
0924a04e22be1339356c24b69b2e75516c56b0b23aa500e9068b9c28c54dd5b9_Sigmanly.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734
Targets
-
-
Target
0924a04e22be1339356c24b69b2e75516c56b0b23aa500e9068b9c28c54dd5b9_Sigmanly
-
Size
4.3MB
-
MD5
84e0e622857460da96501532a233c862
-
SHA1
a83b246ef32b7a66a8cbbc54edd3bb667f956b9b
-
SHA256
0924a04e22be1339356c24b69b2e75516c56b0b23aa500e9068b9c28c54dd5b9
-
SHA512
db686ccaa7ed5c1707f18a9482257ad1b1f9101be0d3e975b4aa18f6eec5ed1860aa881b21f9c8265a0ac58c39becf433fff98de874c364b9953eb542f12d1ce
-
SSDEEP
98304:Sbmf0HEYlXEh8T9Vp33Jp5JdJ9PRpyOnb+tQUAFPJNpzBgyX2+HlDuAw8TV:MrkYtK8Z33ZpX3tndnqCPDFGW2UUMp
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-