General
-
Target
2766e65bd149a68ec2a3f392eb55b713619b6374c81b5d03b0c074c3a33b9496
-
Size
5.4MB
-
Sample
250211-q6qvxavkev
-
MD5
d2c01e16280221c756abe1fb041af7e5
-
SHA1
f3031ba121acd543997c564d6ea05effe2187200
-
SHA256
2766e65bd149a68ec2a3f392eb55b713619b6374c81b5d03b0c074c3a33b9496
-
SHA512
becad27fbc0f957806509dcf5936c2f6b80df006e7a1ee3589b8472aa7abb5a4ec1ae8f4bb762bbb6c839448c3c478d1f96709d3f6ff62c339766c8a31ddf9ec
-
SSDEEP
98304:Zs2we8ErfdMgg3X3sQzClYCg4p4eGOCYciJhHPXWmYRfs9DqgrFX6:mErfOh3s4h4p4uxPPXWmYREJrc
Static task
static1
Behavioral task
behavioral1
Sample
2766e65bd149a68ec2a3f392eb55b713619b6374c81b5d03b0c074c3a33b9496.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2766e65bd149a68ec2a3f392eb55b713619b6374c81b5d03b0c074c3a33b9496.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
cryptbot
http://home.elvnuuu11pn.top/ulvJaKQlXazlgWxqjbuu04
Targets
-
-
Target
2766e65bd149a68ec2a3f392eb55b713619b6374c81b5d03b0c074c3a33b9496
-
Size
5.4MB
-
MD5
d2c01e16280221c756abe1fb041af7e5
-
SHA1
f3031ba121acd543997c564d6ea05effe2187200
-
SHA256
2766e65bd149a68ec2a3f392eb55b713619b6374c81b5d03b0c074c3a33b9496
-
SHA512
becad27fbc0f957806509dcf5936c2f6b80df006e7a1ee3589b8472aa7abb5a4ec1ae8f4bb762bbb6c839448c3c478d1f96709d3f6ff62c339766c8a31ddf9ec
-
SSDEEP
98304:Zs2we8ErfdMgg3X3sQzClYCg4p4eGOCYciJhHPXWmYRfs9DqgrFX6:mErfOh3s4h4p4uxPPXWmYREJrc
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1