General
-
Target
72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0
-
Size
3.2MB
-
Sample
250117-zyqdvasrdz
-
MD5
ef95037bc2bc262ebf19f6d0e32989aa
-
SHA1
3758acfc8f32db765d3bed155293c10e9f2d563c
-
SHA256
72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0
-
SHA512
da21c049dc5f7397c32e62b03e49c72933fe9ad16c90fb85d5dc12ad5b3e5ca08068096fb8d1befdbbfb92137cea1a852f6cdecac7ab77906d6a62b28e26631b
-
SSDEEP
49152:ZsvZqioD6MlKCXijBNt9BlXMJq7FSFG+85whW7QMt9XoayEIu3tyws:ZshoDVKCXidDDpRSFG+fhWM6CoIudBs
Static task
static1
Behavioral task
behavioral1
Sample
72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe
Resource
win7-20240903-en
Malware Config
Extracted
cryptbot
Targets
-
-
Target
72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0
-
Size
3.2MB
-
MD5
ef95037bc2bc262ebf19f6d0e32989aa
-
SHA1
3758acfc8f32db765d3bed155293c10e9f2d563c
-
SHA256
72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0
-
SHA512
da21c049dc5f7397c32e62b03e49c72933fe9ad16c90fb85d5dc12ad5b3e5ca08068096fb8d1befdbbfb92137cea1a852f6cdecac7ab77906d6a62b28e26631b
-
SSDEEP
49152:ZsvZqioD6MlKCXijBNt9BlXMJq7FSFG+85whW7QMt9XoayEIu3tyws:ZshoDVKCXidDDpRSFG+fhWM6CoIudBs
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-