General
-
Target
4648e37901ccb1b4cc76c67a6d13d13d4233233bc8ef0f167f411821e682ba01.exe
-
Size
8.6MB
-
Sample
250207-e92wssyphs
-
MD5
800f4d04c18ede014d4a9223e40f1d3a
-
SHA1
6390f2d89d270d9e6e234bd4edd7868c135edf6d
-
SHA256
4648e37901ccb1b4cc76c67a6d13d13d4233233bc8ef0f167f411821e682ba01
-
SHA512
7574393ce996cc47b6db2a9f0afa0d52f3f74f0123db252fe87e69f25aa29e6ff2a30437e25d16071a4ccabc81e8565effaf22e3d55e84242c8988e7b7b6be89
-
SSDEEP
98304:/dGauGH9PjGJBf3VVcWQmRIqwssejFp0AKOyz8Eaj:HABf7hVWAhG8Eaj
Static task
static1
Behavioral task
behavioral1
Sample
4648e37901ccb1b4cc76c67a6d13d13d4233233bc8ef0f167f411821e682ba01.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4648e37901ccb1b4cc76c67a6d13d13d4233233bc8ef0f167f411821e682ba01.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
4648e37901ccb1b4cc76c67a6d13d13d4233233bc8ef0f167f411821e682ba01.exe
-
Size
8.6MB
-
MD5
800f4d04c18ede014d4a9223e40f1d3a
-
SHA1
6390f2d89d270d9e6e234bd4edd7868c135edf6d
-
SHA256
4648e37901ccb1b4cc76c67a6d13d13d4233233bc8ef0f167f411821e682ba01
-
SHA512
7574393ce996cc47b6db2a9f0afa0d52f3f74f0123db252fe87e69f25aa29e6ff2a30437e25d16071a4ccabc81e8565effaf22e3d55e84242c8988e7b7b6be89
-
SSDEEP
98304:/dGauGH9PjGJBf3VVcWQmRIqwssejFp0AKOyz8Eaj:HABf7hVWAhG8Eaj
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1