General
-
Target
7567ce3bd749a652fe7ea142469435879d01c583733445d7274f18197be86a11_Sigmanly
-
Size
4.3MB
-
Sample
241224-qy3vhaypbm
-
MD5
f8119ea749e5866171d009cc0a74fb20
-
SHA1
1ce027cdc82a44d705f591ba33293222a2fc3385
-
SHA256
7567ce3bd749a652fe7ea142469435879d01c583733445d7274f18197be86a11
-
SHA512
3eba6b236784a220ea6f71cebe79fe811db7ba2859d5e4816fb08d87c56e103d5edcbc4487073cbf14536ff9ffae87f0627b5a82dbc024b0458d9c251179c03c
-
SSDEEP
98304:DgAqekBSjMPeMIm5nmULfB9xc7hDI2upiI59GUnl+Ld/KXrxvV2GWV:euMPeMIyms/2Khd5MxLZieGK
Static task
static1
Behavioral task
behavioral1
Sample
7567ce3bd749a652fe7ea142469435879d01c583733445d7274f18197be86a11_Sigmanly.exe
Resource
win7-20240708-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
7567ce3bd749a652fe7ea142469435879d01c583733445d7274f18197be86a11_Sigmanly
-
Size
4.3MB
-
MD5
f8119ea749e5866171d009cc0a74fb20
-
SHA1
1ce027cdc82a44d705f591ba33293222a2fc3385
-
SHA256
7567ce3bd749a652fe7ea142469435879d01c583733445d7274f18197be86a11
-
SHA512
3eba6b236784a220ea6f71cebe79fe811db7ba2859d5e4816fb08d87c56e103d5edcbc4487073cbf14536ff9ffae87f0627b5a82dbc024b0458d9c251179c03c
-
SSDEEP
98304:DgAqekBSjMPeMIm5nmULfB9xc7hDI2upiI59GUnl+Ld/KXrxvV2GWV:euMPeMIyms/2Khd5MxLZieGK
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-