General
-
Target
38882fc16840014780f2186955fe0305b190824204db1ac6cc44e0be84fbf33c.exe
-
Size
4.3MB
-
Sample
241224-d6re8a1mhk
-
MD5
3196bde966d070a54658abbfd66a0f4e
-
SHA1
7014bc8b36f162fa42e0de2b8f67f7ac6a4b197a
-
SHA256
38882fc16840014780f2186955fe0305b190824204db1ac6cc44e0be84fbf33c
-
SHA512
38b3d4d81a386daf9a7648bca7b36a7b7ae3b7e0ecc40e414a9672883330caa10e6ec89b866bbc418e9a45c747d59ec2c2a89787d36767872a92cc1a09cc7028
-
SSDEEP
98304:g5qLiX/Oa5ORhqLxodCQgn083+sHIhgHfLFjws/L2oLkb:6qLiX/B22zdF3+sHVl/L
Static task
static1
Behavioral task
behavioral1
Sample
38882fc16840014780f2186955fe0305b190824204db1ac6cc44e0be84fbf33c.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
38882fc16840014780f2186955fe0305b190824204db1ac6cc44e0be84fbf33c.exe
-
Size
4.3MB
-
MD5
3196bde966d070a54658abbfd66a0f4e
-
SHA1
7014bc8b36f162fa42e0de2b8f67f7ac6a4b197a
-
SHA256
38882fc16840014780f2186955fe0305b190824204db1ac6cc44e0be84fbf33c
-
SHA512
38b3d4d81a386daf9a7648bca7b36a7b7ae3b7e0ecc40e414a9672883330caa10e6ec89b866bbc418e9a45c747d59ec2c2a89787d36767872a92cc1a09cc7028
-
SSDEEP
98304:g5qLiX/Oa5ORhqLxodCQgn083+sHIhgHfLFjws/L2oLkb:6qLiX/B22zdF3+sHVl/L
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-