General

  • Target

    0c9fc2b51c7c604fd0bd9789f344cb95.bin

  • Size

    4.2MB

  • Sample

    241229-bc2yraxnep

  • MD5

    6b16eaae0d135386a571a47508372e04

  • SHA1

    f78a6b493472d9f0ed58c9155ea8c049c3f3ff5e

  • SHA256

    88639beb43f9f022dbd93ce54f619699ed32cf58e8ae7da660cf6ce853be049b

  • SHA512

    b0f3eb49c991ed5fbdf36a5fc81e8622bdb0a20be006f25369874f5674ba209a2d48b18f4d03df0ad8930742f7814b1ea3460669ed6bed858d3fb7693056edaf

  • SSDEEP

    98304:dRhwyzTXi4ShWurN6aiM8EAihZ5ULtFC076HyuK3:dRhDzLBShW8+EThXU3uHyuK3

Malware Config

Extracted

Family

cryptbot

Targets

    • Target

      5215a50e992b411a73a9cb9dee51b39ce8b7505de7995bcba240e6f809b3696b.exe

    • Size

      4.3MB

    • MD5

      0c9fc2b51c7c604fd0bd9789f344cb95

    • SHA1

      c9dcd9ec34f73e7d109605f5b092e7f16be55bd7

    • SHA256

      5215a50e992b411a73a9cb9dee51b39ce8b7505de7995bcba240e6f809b3696b

    • SHA512

      264670682c48ce6ab59f62187f31b7afff4832c1ec0115b83864e6df8318b8c818c49ed14a54ef9c13abe30bc522ac6eba76ece5cb9a455ec8c47a64d22d2885

    • SSDEEP

      98304:dGz4NC30FzVzO37pp8vTUm66oGy7IvqGc8RZD5ieCXTQuGbov:dGz4Ny0FVzACTUm6LG6Ivp9ZIXcjo

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks