General

  • Target

    b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7.exe

  • Size

    4.3MB

  • Sample

    241224-geetwssjf1

  • MD5

    c68297282df3b519f90b07be11d5b2c3

  • SHA1

    b458d00cab0449a1c9f0f9225cc5c326199425f6

  • SHA256

    b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7

  • SHA512

    b70746441c6cf4c6df94cd1171e3bb1737462cec5eb5739ef5e75a52d9209fdb32bb3c85ed632c0a68834e22fc21476233aa706f37c0f7f74d701147c0a05d22

  • SSDEEP

    98304:LfBXhUHRUyhPc25hvSIE2V7dm9D/4ija7X9D1C:VhM302dV7s9laphC

Malware Config

Extracted

Family

cryptbot

Targets

    • Target

      b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7.exe

    • Size

      4.3MB

    • MD5

      c68297282df3b519f90b07be11d5b2c3

    • SHA1

      b458d00cab0449a1c9f0f9225cc5c326199425f6

    • SHA256

      b33d993baf0f52b1f0e01b6d6d4f568c37c21a641f41c8f6fb72c493f80a91a7

    • SHA512

      b70746441c6cf4c6df94cd1171e3bb1737462cec5eb5739ef5e75a52d9209fdb32bb3c85ed632c0a68834e22fc21476233aa706f37c0f7f74d701147c0a05d22

    • SSDEEP

      98304:LfBXhUHRUyhPc25hvSIE2V7dm9D/4ija7X9D1C:VhM302dV7s9laphC

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks