General
-
Target
26e7c91d9fb68ef0ce54aabc0465a8b0.exe
-
Size
4.3MB
-
Sample
241227-jfvmvatjfm
-
MD5
26e7c91d9fb68ef0ce54aabc0465a8b0
-
SHA1
a2b0aee031cbd7f67d4f86c45354a2715ca0c25c
-
SHA256
23569c1720e9dd2b72da3ea832f2a0029c29c8d6b5f3e50caefed0dcbaa605ac
-
SHA512
047adff7d51e812470213b18cb11b9f5ec22e4416f7d6ea9bdfdea39159ae752fcafd5dd94e143b69fbaa4196f2a81e4a7e82843acd9467bb3590eb1ae823edb
-
SSDEEP
98304:1AIJjZfEYfN71TmUuOXQiItb+6B+s9K+MDYpHMtl7kl:OIJj1EdUuOAFtbfUs9K+T1Mtl7kl
Static task
static1
Behavioral task
behavioral1
Sample
26e7c91d9fb68ef0ce54aabc0465a8b0.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
26e7c91d9fb68ef0ce54aabc0465a8b0.exe
-
Size
4.3MB
-
MD5
26e7c91d9fb68ef0ce54aabc0465a8b0
-
SHA1
a2b0aee031cbd7f67d4f86c45354a2715ca0c25c
-
SHA256
23569c1720e9dd2b72da3ea832f2a0029c29c8d6b5f3e50caefed0dcbaa605ac
-
SHA512
047adff7d51e812470213b18cb11b9f5ec22e4416f7d6ea9bdfdea39159ae752fcafd5dd94e143b69fbaa4196f2a81e4a7e82843acd9467bb3590eb1ae823edb
-
SSDEEP
98304:1AIJjZfEYfN71TmUuOXQiItb+6B+s9K+MDYpHMtl7kl:OIJj1EdUuOAFtbfUs9K+T1Mtl7kl
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-