General
-
Target
f00b4916dfb8458f46a8e4d556884b185676d28d3253be0f561db7d1f9bf3c09_Sigmanly
-
Size
4.3MB
-
Sample
241221-ratgla1lbn
-
MD5
67844ee11cdf53db1185db90d33cf907
-
SHA1
33dc77a1ae23d6a5bc0da0429ad3f0f855c8d4d9
-
SHA256
f00b4916dfb8458f46a8e4d556884b185676d28d3253be0f561db7d1f9bf3c09
-
SHA512
f317adaa600efbe4db4fc630a8d971328b40e44c6b94fdc5bc8aafcf1ad47626a94db815dbf62e655de4600ba4b89651ad76ff7df71ec39543ca301f94524a76
-
SSDEEP
98304:OYexTGTTGbdZZElFJWR3a+zn3kMkslFzf1n5MFJW43R8:WMTcdEs9VRnM3WYO
Static task
static1
Behavioral task
behavioral1
Sample
f00b4916dfb8458f46a8e4d556884b185676d28d3253be0f561db7d1f9bf3c09_Sigmanly.exe
Resource
win7-20240708-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
f00b4916dfb8458f46a8e4d556884b185676d28d3253be0f561db7d1f9bf3c09_Sigmanly
-
Size
4.3MB
-
MD5
67844ee11cdf53db1185db90d33cf907
-
SHA1
33dc77a1ae23d6a5bc0da0429ad3f0f855c8d4d9
-
SHA256
f00b4916dfb8458f46a8e4d556884b185676d28d3253be0f561db7d1f9bf3c09
-
SHA512
f317adaa600efbe4db4fc630a8d971328b40e44c6b94fdc5bc8aafcf1ad47626a94db815dbf62e655de4600ba4b89651ad76ff7df71ec39543ca301f94524a76
-
SSDEEP
98304:OYexTGTTGbdZZElFJWR3a+zn3kMkslFzf1n5MFJW43R8:WMTcdEs9VRnM3WYO
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-