General
-
Target
b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23
-
Size
154KB
-
Sample
210926-2l1edsfcgp
-
MD5
886b4b87250c31f9e17d0be3dde1a920
-
SHA1
94067fea1c477011731f491d912d3f1cb4f893b2
-
SHA256
b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23
-
SHA512
bee9cdbb85f872427b4d03a8fcd88eab072c23e50c305d9ddd41cfa66e6e5499c00a8c2ef5361db889a9833cc667ddfa7e820e399b645ec058e1890d9dd93db3
Static task
static1
Malware Config
Targets
-
-
Target
b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23
-
Size
154KB
-
MD5
886b4b87250c31f9e17d0be3dde1a920
-
SHA1
94067fea1c477011731f491d912d3f1cb4f893b2
-
SHA256
b23f703c7ca079fa43cc7fb65f58ec401533fada301eeeec2403ef68f339bf23
-
SHA512
bee9cdbb85f872427b4d03a8fcd88eab072c23e50c305d9ddd41cfa66e6e5499c00a8c2ef5361db889a9833cc667ddfa7e820e399b645ec058e1890d9dd93db3
-
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-