General
-
Target
30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958.exe
-
Size
4.3MB
-
Sample
241224-ds4hma1laj
-
MD5
23654bc41b1e628a2fe82efafd8b201f
-
SHA1
70130080ec1490210f86181e152ff916d9f73a58
-
SHA256
30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958
-
SHA512
032b9bb74b6d6a016e46f7f2da5631f55f5c0869b9f1289619a78881f8194deb6c4bd4cb0776561eb4c0da10647cc216cb39096768f0b4cdaf3741246627577b
-
SSDEEP
98304:ZmPa3W5uNTfzipqy+Vhvscf2/++EPYMEevIeTU2SwDtWWRERaqX5y:4Pa3OWuevsb/+BAlev5IIWWekqX5y
Static task
static1
Behavioral task
behavioral1
Sample
30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958.exe
Resource
win7-20240729-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958.exe
-
Size
4.3MB
-
MD5
23654bc41b1e628a2fe82efafd8b201f
-
SHA1
70130080ec1490210f86181e152ff916d9f73a58
-
SHA256
30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958
-
SHA512
032b9bb74b6d6a016e46f7f2da5631f55f5c0869b9f1289619a78881f8194deb6c4bd4cb0776561eb4c0da10647cc216cb39096768f0b4cdaf3741246627577b
-
SSDEEP
98304:ZmPa3W5uNTfzipqy+Vhvscf2/++EPYMEevIeTU2SwDtWWRERaqX5y:4Pa3OWuevsb/+BAlev5IIWWekqX5y
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-