General
-
Target
e19b4e93fef9da4842269e6b56525234fe2d9f63dbdbde078f95f232203ffa78.exe
-
Size
4.3MB
-
Sample
241229-datwgazpfs
-
MD5
c2d6d6a303bf3d49e1583b88057ee698
-
SHA1
767f54fba4dc5171d7cdba1835b052b779ae97f3
-
SHA256
e19b4e93fef9da4842269e6b56525234fe2d9f63dbdbde078f95f232203ffa78
-
SHA512
90ba16d06fcb2284f2e49d8b3ad220e7411fec48b9bc343bc53d30d64c22e14dc6ee86436c63d05ea5ab41e7afee6d6682e01450f77577d902d12aa2f70a67fc
-
SSDEEP
98304:4XiGmrJbVboCxSlNDi+R1F8O/9ivWANxWZ:9JJbVS/n7F8RvnWZ
Static task
static1
Behavioral task
behavioral1
Sample
e19b4e93fef9da4842269e6b56525234fe2d9f63dbdbde078f95f232203ffa78.exe
Resource
win7-20240708-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
e19b4e93fef9da4842269e6b56525234fe2d9f63dbdbde078f95f232203ffa78.exe
-
Size
4.3MB
-
MD5
c2d6d6a303bf3d49e1583b88057ee698
-
SHA1
767f54fba4dc5171d7cdba1835b052b779ae97f3
-
SHA256
e19b4e93fef9da4842269e6b56525234fe2d9f63dbdbde078f95f232203ffa78
-
SHA512
90ba16d06fcb2284f2e49d8b3ad220e7411fec48b9bc343bc53d30d64c22e14dc6ee86436c63d05ea5ab41e7afee6d6682e01450f77577d902d12aa2f70a67fc
-
SSDEEP
98304:4XiGmrJbVboCxSlNDi+R1F8O/9ivWANxWZ:9JJbVS/n7F8RvnWZ
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-