General

  • Target

    30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958.exe

  • Size

    4.3MB

  • Sample

    241224-ds4hma1laj

  • MD5

    23654bc41b1e628a2fe82efafd8b201f

  • SHA1

    70130080ec1490210f86181e152ff916d9f73a58

  • SHA256

    30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958

  • SHA512

    032b9bb74b6d6a016e46f7f2da5631f55f5c0869b9f1289619a78881f8194deb6c4bd4cb0776561eb4c0da10647cc216cb39096768f0b4cdaf3741246627577b

  • SSDEEP

    98304:ZmPa3W5uNTfzipqy+Vhvscf2/++EPYMEevIeTU2SwDtWWRERaqX5y:4Pa3OWuevsb/+BAlev5IIWWekqX5y

Malware Config

Extracted

Family

cryptbot

Targets

    • Target

      30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958.exe

    • Size

      4.3MB

    • MD5

      23654bc41b1e628a2fe82efafd8b201f

    • SHA1

      70130080ec1490210f86181e152ff916d9f73a58

    • SHA256

      30b494a3182f6db6f33a9f6981a501cece580f3c7ec7349c2ce696421fef6958

    • SHA512

      032b9bb74b6d6a016e46f7f2da5631f55f5c0869b9f1289619a78881f8194deb6c4bd4cb0776561eb4c0da10647cc216cb39096768f0b4cdaf3741246627577b

    • SSDEEP

      98304:ZmPa3W5uNTfzipqy+Vhvscf2/++EPYMEevIeTU2SwDtWWRERaqX5y:4Pa3OWuevsb/+BAlev5IIWWekqX5y

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks