General
-
Target
Defender.exe
-
Size
8.3MB
-
Sample
210627-pzkfxphx9x
-
MD5
87fa7a1ee39276516b9753556897546d
-
SHA1
8c5db106bdda5304dc65a439d4bf806751117424
-
SHA256
788490416fe054993a1a4033b0f287399167eaad913a1cfc24efe324246645f4
-
SHA512
c7a9db600886f816b561aa9c73ba25784294b4d5ee537990c6b5efc4d0ed4adc3e728865bd7da692be3dc4f7e57efebadaa36d00b49075f046dacfce9136fe8f
Static task
static1
Behavioral task
behavioral1
Sample
Defender.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Defender.exe
Resource
win10v20210410
Malware Config
Targets
-
-
Target
Defender.exe
-
Size
8.3MB
-
MD5
87fa7a1ee39276516b9753556897546d
-
SHA1
8c5db106bdda5304dc65a439d4bf806751117424
-
SHA256
788490416fe054993a1a4033b0f287399167eaad913a1cfc24efe324246645f4
-
SHA512
c7a9db600886f816b561aa9c73ba25784294b4d5ee537990c6b5efc4d0ed4adc3e728865bd7da692be3dc4f7e57efebadaa36d00b49075f046dacfce9136fe8f
-
XMRig Miner Payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-