General

  • Target

    e78ed16dc1488e89f074a3b7f92683910d50f3849c7e94531b13cccf5eface73.exe

  • Size

    4.3MB

  • Sample

    241224-gnrvtaslbs

  • MD5

    5fcf1c70847c8d629264384d6d6c8acf

  • SHA1

    d9edad7806c30dd9b980d4705a0891339621cf7a

  • SHA256

    e78ed16dc1488e89f074a3b7f92683910d50f3849c7e94531b13cccf5eface73

  • SHA512

    5f317afdee88fadd924f2f3f3eb95226a627ccf8061357fe0a3fb7e2d8ace5da2bf5fc383038c2b191eea94a804e36611bcc2226b565955fa6e3d6f8510f4175

  • SSDEEP

    98304:V+7uR57NzRP1qxQ/EprGbbEV70UA6Wmu+aUzh1Zxs:A7QLlP1eQ+rGE70UN6WW

Malware Config

Extracted

Family

cryptbot

Targets

    • Target

      e78ed16dc1488e89f074a3b7f92683910d50f3849c7e94531b13cccf5eface73.exe

    • Size

      4.3MB

    • MD5

      5fcf1c70847c8d629264384d6d6c8acf

    • SHA1

      d9edad7806c30dd9b980d4705a0891339621cf7a

    • SHA256

      e78ed16dc1488e89f074a3b7f92683910d50f3849c7e94531b13cccf5eface73

    • SHA512

      5f317afdee88fadd924f2f3f3eb95226a627ccf8061357fe0a3fb7e2d8ace5da2bf5fc383038c2b191eea94a804e36611bcc2226b565955fa6e3d6f8510f4175

    • SSDEEP

      98304:V+7uR57NzRP1qxQ/EprGbbEV70UA6Wmu+aUzh1Zxs:A7QLlP1eQ+rGE70UN6WW

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks