General

  • Target

    SecuriteInfo.com.Variant.Zusy.579171.21622.20496.exe

  • Size

    6.3MB

  • Sample

    250210-kyfgbawkak

  • MD5

    3d9d112de1d1c23fa2b4eb8d321ce6e5

  • SHA1

    9314e7202b643196bf242f388fdd806506e10b20

  • SHA256

    7e49f1011a210abac4fdb4472a4ae389871222061a3bd2ae7375855933b093a4

  • SHA512

    b61bfe8da853dc93f8a9f9e0b82cbca0242337a561505a0947b9ada2534eca649f56ef146cf51af0f82f08221337db953c4f132236b3d8f77f32218406f4dd9b

  • SSDEEP

    98304:mr4ZWX/n/RYNTYxiFwBucMQudBXR+MUBDW5IeBgsh22I2fcgI:Xw/RYNTrMjPq9gsh2x2zI

Malware Config

Extracted

Family

cryptbot

C2

http://home.fivepp5sb.top/joLepLgSzIBRhlkJbQYx17

Targets

    • Target

      SecuriteInfo.com.Variant.Zusy.579171.21622.20496.exe

    • Size

      6.3MB

    • MD5

      3d9d112de1d1c23fa2b4eb8d321ce6e5

    • SHA1

      9314e7202b643196bf242f388fdd806506e10b20

    • SHA256

      7e49f1011a210abac4fdb4472a4ae389871222061a3bd2ae7375855933b093a4

    • SHA512

      b61bfe8da853dc93f8a9f9e0b82cbca0242337a561505a0947b9ada2534eca649f56ef146cf51af0f82f08221337db953c4f132236b3d8f77f32218406f4dd9b

    • SSDEEP

      98304:mr4ZWX/n/RYNTYxiFwBucMQudBXR+MUBDW5IeBgsh22I2fcgI:Xw/RYNTrMjPq9gsh2x2zI

    • CryptBot

      CryptBot is a C++ stealer distributed widely in bundle with other software.

    • Cryptbot family

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks