General
-
Target
2115e3fbda695f11af734c24ee699e6d.exe
-
Size
4.3MB
-
Sample
241228-kdk63awrht
-
MD5
2115e3fbda695f11af734c24ee699e6d
-
SHA1
334ace427d9b4e6a95ea977e31c8060c3e3eb54c
-
SHA256
a782e6fb792b210e82802ac312542a670a37f4668031418875db91a4c9dfd5be
-
SHA512
7f198dce8e11febbd0240783fcb167852bf61c363c86f9493f7fe229fb600130b7a1697ef168d26f767319d081b4798c8584c3e08ee476483e330e74c9bf6738
-
SSDEEP
98304:l6K88R3RbvX59VfoLNuqfCxpK4N7URJT6S9Rjf/J8Zvx:lV88fX53foLnqvsN6S/jfKZv
Static task
static1
Behavioral task
behavioral1
Sample
2115e3fbda695f11af734c24ee699e6d.exe
Resource
win7-20241023-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
2115e3fbda695f11af734c24ee699e6d.exe
-
Size
4.3MB
-
MD5
2115e3fbda695f11af734c24ee699e6d
-
SHA1
334ace427d9b4e6a95ea977e31c8060c3e3eb54c
-
SHA256
a782e6fb792b210e82802ac312542a670a37f4668031418875db91a4c9dfd5be
-
SHA512
7f198dce8e11febbd0240783fcb167852bf61c363c86f9493f7fe229fb600130b7a1697ef168d26f767319d081b4798c8584c3e08ee476483e330e74c9bf6738
-
SSDEEP
98304:l6K88R3RbvX59VfoLNuqfCxpK4N7URJT6S9Rjf/J8Zvx:lV88fX53foLnqvsN6S/jfKZv
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-