General
-
Target
03ae071235d37edc3ea30848462bccbc.bin
-
Size
4.2MB
-
Sample
241222-bcvvfaxjfp
-
MD5
5c80d08c664aedf0ba32fdcaabc1cf6c
-
SHA1
ae9d87d68bcb5c0c25b8463a9bd7a550ae3cf634
-
SHA256
e41b3c2b6fe35d71b4318500840f8b826376709b827391d5b09eee8037866997
-
SHA512
4b3a037c114d3c311011d4c5d9b0bf9230ef8d9ae010ce954bfae4c4795d9dc99643ccc3efdf4527a198a60b1ead78675bb7279390a3342d597382b3130317ad
-
SSDEEP
98304:HkId95BRenss7U+Co+bjk+h3YLf1BJ7wpHB:HJ/ess7U+mQf1zkpHB
Static task
static1
Behavioral task
behavioral1
Sample
72662d9e82835cb7e3210889828befd75dd7921c8bb6c45f5757c23602432536.exe
Resource
win7-20241010-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
72662d9e82835cb7e3210889828befd75dd7921c8bb6c45f5757c23602432536.exe
-
Size
4.2MB
-
MD5
03ae071235d37edc3ea30848462bccbc
-
SHA1
d8425df6c157fc8699596f64a0bf996692ebc947
-
SHA256
72662d9e82835cb7e3210889828befd75dd7921c8bb6c45f5757c23602432536
-
SHA512
2ef13be57bdebf61bf59e7b39a5c522f91ddb9d003a1a9a66b3fa9c7ef35ead57626858050ef2615ed87da4a32759328121e63fb46b2b4ce2f949caeea8871dc
-
SSDEEP
98304:96/aLUGOI+ds3fWZOf+6hrjqgYyHX83X/x6MmfIOe2AHk5JLr4D5:UyLUBI+do26hflYyHX+J6Zn0uJLr25
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-