General
-
Target
3bb78a6903d99f28dbdb09dbb4327aa60a1e697dd79a74a4b350e0984e5fcf8d.zip
-
Size
4.3MB
-
Sample
250211-yxme5ayqfz
-
MD5
7f2338df6bb2b16431ef803621781449
-
SHA1
c7708220ec71cc5c3f15eb930d9ddbe74db63e1e
-
SHA256
d5e96c3d1eeb73aad47d9df1e88614ce143a345b5f116be0063fef20f22c83c9
-
SHA512
1b35d239bd838e4ba97e0cd757c2a2a6fdf6c652d17c71bca0cd3e9c93e040d73f863d2eb76c1799319466439d19fcefd8cc3ec6435464be6862c8412308f8ca
-
SSDEEP
98304:8IEserUOsLCztJvrVNRogZxWkGU6fqDEjdAMCy+sHD+Vp/:8FqLktJvrPugXzGUSqiATypj8/
Static task
static1
Behavioral task
behavioral1
Sample
3bb78a6903d99f28dbdb09dbb4327aa60a1e697dd79a74a4b350e0984e5fcf8d.exe
Resource
win7-20241023-de
Behavioral task
behavioral2
Sample
3bb78a6903d99f28dbdb09dbb4327aa60a1e697dd79a74a4b350e0984e5fcf8d.exe
Resource
win10v2004-20250211-de
Malware Config
Extracted
cryptbot
http://home.fivepp5sb.top/joLepLgSzIBRhlkJbQYx17
Targets
-
-
Target
3bb78a6903d99f28dbdb09dbb4327aa60a1e697dd79a74a4b350e0984e5fcf8d.exe
-
Size
6.3MB
-
MD5
2149b9148cb557c34c21d866b501ac98
-
SHA1
83df12db33d73c193a1df1056bbde38cc4f6d210
-
SHA256
3bb78a6903d99f28dbdb09dbb4327aa60a1e697dd79a74a4b350e0984e5fcf8d
-
SHA512
81f40561636b84cbb6be3329a63d542777123ba12912e1ad73a5fb1c4ef5d8a12ea6418d356c49da61a53b8682071c3bda49ee9c9aa324181cf5562a70264b4e
-
SSDEEP
98304:Kxa1T8awJOxxbdOC3j1trIy9TI967Xtlkxp33GHG7bW0smSL:Ks1A5UxxBbj1trH9TI9n36WbW0
-
Cryptbot family
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1