General
-
Target
b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7.exe
-
Size
4.3MB
-
Sample
241224-gccazssjdt
-
MD5
c68297282df3b519f90b07be11d5b2c3
-
SHA1
b458d00cab0449a1c9f0f9225cc5c326199425f6
-
SHA256
b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7
-
SHA512
b70746441c6cf4c6df94cd1171e3bb1737462cec5eb5739ef5e75a52d9209fdb32bb3c85ed632c0a68834e22fc21476233aa706f37c0f7f74d701147c0a05d22
-
SSDEEP
98304:LfBXhUHRUyhPc25hvSIE2V7dm9D/4ija7X9D1C:VhM302dV7s9laphC
Static task
static1
Behavioral task
behavioral1
Sample
b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7.exe
-
Size
4.3MB
-
MD5
c68297282df3b519f90b07be11d5b2c3
-
SHA1
b458d00cab0449a1c9f0f9225cc5c326199425f6
-
SHA256
b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7
-
SHA512
b70746441c6cf4c6df94cd1171e3bb1737462cec5eb5739ef5e75a52d9209fdb32bb3c85ed632c0a68834e22fc21476233aa706f37c0f7f74d701147c0a05d22
-
SSDEEP
98304:LfBXhUHRUyhPc25hvSIE2V7dm9D/4ija7X9D1C:VhM302dV7s9laphC
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-