General
-
Target
605f4d4c3e2be9f71fe0974b6ce3c714.exe
-
Size
4.3MB
-
Sample
241227-jfvb3stjer
-
MD5
605f4d4c3e2be9f71fe0974b6ce3c714
-
SHA1
b361107308ff54acebd2221648551ea4ea60d679
-
SHA256
f455531a6a17ac4c13070b4dc22758990ec5c31dfb80f4a4f914745f66da3d2f
-
SHA512
d1181b2fa61e2c6c9b908bb5c9cd24376f286dbabc9c916527501fae981be4d7f735c6dcbd9e6bcc7dce586d0993a45fc8d84dc156bc16f5360e1b2197d57e49
-
SSDEEP
98304:rlU+ho/skYnTALFT52S0X5Uy5TOiTdoCiJjHgA82r6rQdu3fkF:rlL1kYcLv0XVRoCW866r6uPkF
Static task
static1
Behavioral task
behavioral1
Sample
605f4d4c3e2be9f71fe0974b6ce3c714.exe
Resource
win7-20240729-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
605f4d4c3e2be9f71fe0974b6ce3c714.exe
-
Size
4.3MB
-
MD5
605f4d4c3e2be9f71fe0974b6ce3c714
-
SHA1
b361107308ff54acebd2221648551ea4ea60d679
-
SHA256
f455531a6a17ac4c13070b4dc22758990ec5c31dfb80f4a4f914745f66da3d2f
-
SHA512
d1181b2fa61e2c6c9b908bb5c9cd24376f286dbabc9c916527501fae981be4d7f735c6dcbd9e6bcc7dce586d0993a45fc8d84dc156bc16f5360e1b2197d57e49
-
SSDEEP
98304:rlU+ho/skYnTALFT52S0X5Uy5TOiTdoCiJjHgA82r6rQdu3fkF:rlL1kYcLv0XVRoCW866r6uPkF
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-