General
-
Target
357a1d94af889c7d73ca1a767222066f3550e007c7f52d3f83895fc5bf2e17b6.exe
-
Size
93KB
-
Sample
210629-ccag6pwlpa
-
MD5
5c37355f4e6e623f3c097711ba48f136
-
SHA1
363099caa5941f78a9912925963c54ad386f0c44
-
SHA256
357a1d94af889c7d73ca1a767222066f3550e007c7f52d3f83895fc5bf2e17b6
-
SHA512
a293f6f761c1a7d65964b8d6aff32c60f4b289327779d3c6286718656101d4882d3e123840e4bb34c0c57be924768ca57bb7df2a0021a4b0088b4a3b1892860b
Static task
static1
Behavioral task
behavioral1
Sample
357a1d94af889c7d73ca1a767222066f3550e007c7f52d3f83895fc5bf2e17b6.exe
Resource
win7v20210410
Malware Config
Targets
-
-
Target
357a1d94af889c7d73ca1a767222066f3550e007c7f52d3f83895fc5bf2e17b6.exe
-
Size
93KB
-
MD5
5c37355f4e6e623f3c097711ba48f136
-
SHA1
363099caa5941f78a9912925963c54ad386f0c44
-
SHA256
357a1d94af889c7d73ca1a767222066f3550e007c7f52d3f83895fc5bf2e17b6
-
SHA512
a293f6f761c1a7d65964b8d6aff32c60f4b289327779d3c6286718656101d4882d3e123840e4bb34c0c57be924768ca57bb7df2a0021a4b0088b4a3b1892860b
-
XMRig Miner Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-