General
-
Target
0db9a16d15b04d332d6f96fea01b0c31662105d3097f340ed124c7357a964072.exe
-
Size
4.3MB
-
Sample
241229-cg7kgaypas
-
MD5
81faa857e0e440955735ed78a8c61ddd
-
SHA1
c13ce342d65ff323711b7a8829bcc3f94a3cfe56
-
SHA256
0db9a16d15b04d332d6f96fea01b0c31662105d3097f340ed124c7357a964072
-
SHA512
3daacf7ea9b6160568f0d285898c56921f588a226e5055b803c74533218bde2b9f102facba3e6fd2d47241b9b5edcdb11e2df29daa7307503092c7be161362c9
-
SSDEEP
98304:j6o0e+zdDWFs1wNzJH9K5/ig4mCRqItKHT64yFyeYm5t7g/Htn:j6o0e+z84wVJHs5/x41cW4yEeP5ta
Static task
static1
Behavioral task
behavioral1
Sample
0db9a16d15b04d332d6f96fea01b0c31662105d3097f340ed124c7357a964072.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
0db9a16d15b04d332d6f96fea01b0c31662105d3097f340ed124c7357a964072.exe
-
Size
4.3MB
-
MD5
81faa857e0e440955735ed78a8c61ddd
-
SHA1
c13ce342d65ff323711b7a8829bcc3f94a3cfe56
-
SHA256
0db9a16d15b04d332d6f96fea01b0c31662105d3097f340ed124c7357a964072
-
SHA512
3daacf7ea9b6160568f0d285898c56921f588a226e5055b803c74533218bde2b9f102facba3e6fd2d47241b9b5edcdb11e2df29daa7307503092c7be161362c9
-
SSDEEP
98304:j6o0e+zdDWFs1wNzJH9K5/ig4mCRqItKHT64yFyeYm5t7g/Htn:j6o0e+z84wVJHs5/x41cW4yEeP5ta
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-