General
-
Target
500e3c9c865a5f7652b4404874638619b550941f9548a3fde796bb143e9dea65.exe
-
Size
4.3MB
-
Sample
241224-eadpxs1lbs
-
MD5
a42b5a11fb98e17dca2ea358eac541de
-
SHA1
db5ddcc295e6c1f418514877c76a73da72f6f048
-
SHA256
500e3c9c865a5f7652b4404874638619b550941f9548a3fde796bb143e9dea65
-
SHA512
66a167be34ac5bf65221af4d5db2b324e28c0626ed371353b4177eeb8622367cfb3fac0df7bb1c9c7a4820d6bff85c4ac3a793a27564e867dbb2bf3509ee8c9f
-
SSDEEP
98304:zpBNrmu/zIr0Bvz6wuLAg7TeYbymqQMu0b9vyjftgQ+MV96YGzR:zrEQK06nLJ7TH90xvcV5GN1
Static task
static1
Behavioral task
behavioral1
Sample
500e3c9c865a5f7652b4404874638619b550941f9548a3fde796bb143e9dea65.exe
Resource
win7-20240708-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
500e3c9c865a5f7652b4404874638619b550941f9548a3fde796bb143e9dea65.exe
-
Size
4.3MB
-
MD5
a42b5a11fb98e17dca2ea358eac541de
-
SHA1
db5ddcc295e6c1f418514877c76a73da72f6f048
-
SHA256
500e3c9c865a5f7652b4404874638619b550941f9548a3fde796bb143e9dea65
-
SHA512
66a167be34ac5bf65221af4d5db2b324e28c0626ed371353b4177eeb8622367cfb3fac0df7bb1c9c7a4820d6bff85c4ac3a793a27564e867dbb2bf3509ee8c9f
-
SSDEEP
98304:zpBNrmu/zIr0Bvz6wuLAg7TeYbymqQMu0b9vyjftgQ+MV96YGzR:zrEQK06nLJ7TH90xvcV5GN1
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-