General
-
Target
8a549f15d1418fb4207aadb4ba813a36.bin
-
Size
4.2MB
-
Sample
241222-bvcftaxng1
-
MD5
a62420759a6b60fc05df3a2799e46141
-
SHA1
2031ac428b9393a53de2c9f10194844798dd5cd3
-
SHA256
e39a98929cb79deabbcfd68fa652eb314a8486483e16b4d7098428abd4ded221
-
SHA512
a522539cb4c48f7954e14f986047d36be5d162b0e9f2d1a6cb959e190442d03ac251f3e54c7147103657bc536748d5e81acc3752bfdfb3d75cae99e6a1049b17
-
SSDEEP
98304:buIKcevuMoDUZf5HVn2cmbLfEXj7E2LRFGVzxVBr:bucevucj1LRFSzZr
Static task
static1
Behavioral task
behavioral1
Sample
7dc314359cdb76163923b61fc91175c7a09577e37443ca9711ba9c6b33863391.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
http://home.fivetk5vt.top/hLfzXsaqNtoEGyaUtOMJ1734
Targets
-
-
Target
7dc314359cdb76163923b61fc91175c7a09577e37443ca9711ba9c6b33863391.exe
-
Size
4.2MB
-
MD5
8a549f15d1418fb4207aadb4ba813a36
-
SHA1
9019f532acc00096055788d1212842e8bec35627
-
SHA256
7dc314359cdb76163923b61fc91175c7a09577e37443ca9711ba9c6b33863391
-
SHA512
1aadc1a1eb8715f02108a6df2b28852c58399335a4760afaa9d7637612b117b118d1f7dcbb9bdbb63a067872b7ee37669379575b51b207678cf55c2d45acfbab
-
SSDEEP
98304:tom43DbewIxtiiOomSa347fCM65XFKZcdow9vbFgCAuj1:m7zb4CmaOfI/xTFGy
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-