General
-
Target
75f83958dc211ddd4dfed631aed3aafa.exe
-
Size
4.3MB
-
Sample
241227-jgeb9asrdx
-
MD5
75f83958dc211ddd4dfed631aed3aafa
-
SHA1
b47b4351e5be4bc3830ca73454ee8be8f4f32beb
-
SHA256
85b5d57cad412bcc5921e20d965120f850769b547fc9e63c2a0f1a18f12f7867
-
SHA512
ee8f783396c0419f6af4f3148ae91c994c084998ad499ace665c40053661cdb7b0d3f5d7c5d04ee18c4e84889b2944ae1dfc637a9d19f4271634a02c18b4b084
-
SSDEEP
49152:F3IsqIWhmytT6yGQJLB3p85cVUaRp2HeauaziONsTybSgbBRV/uiGisa0ZZM48YS:Ffqb9eyJlr7V/qXiTyW04zAvyWJV0Z
Static task
static1
Behavioral task
behavioral1
Sample
75f83958dc211ddd4dfed631aed3aafa.exe
Resource
win7-20240708-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
75f83958dc211ddd4dfed631aed3aafa.exe
-
Size
4.3MB
-
MD5
75f83958dc211ddd4dfed631aed3aafa
-
SHA1
b47b4351e5be4bc3830ca73454ee8be8f4f32beb
-
SHA256
85b5d57cad412bcc5921e20d965120f850769b547fc9e63c2a0f1a18f12f7867
-
SHA512
ee8f783396c0419f6af4f3148ae91c994c084998ad499ace665c40053661cdb7b0d3f5d7c5d04ee18c4e84889b2944ae1dfc637a9d19f4271634a02c18b4b084
-
SSDEEP
49152:F3IsqIWhmytT6yGQJLB3p85cVUaRp2HeauaziONsTybSgbBRV/uiGisa0ZZM48YS:Ffqb9eyJlr7V/qXiTyW04zAvyWJV0Z
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-