General
-
Target
a8550ef6b3660ccc7ae2d593c45c22775cf18b392f1b85e567dd720b0ef04b95
-
Size
154KB
-
Sample
210926-3skg7afdbk
-
MD5
731ed07c7e9152ff176cdc849d5ea6a9
-
SHA1
384a9ceaf5dc5cc4fafc61f32137d39fdfffd362
-
SHA256
a8550ef6b3660ccc7ae2d593c45c22775cf18b392f1b85e567dd720b0ef04b95
-
SHA512
63a1f5ce166559cd0ae895d76d6117fd28d6404c2f2bd1e710dfd94310b012417ab9a78312aa31a43eddf94ff1d47c4461a19c8ab69e9ffb3bd22e46971d52ad
Static task
static1
Malware Config
Targets
-
-
Target
a8550ef6b3660ccc7ae2d593c45c22775cf18b392f1b85e567dd720b0ef04b95
-
Size
154KB
-
MD5
731ed07c7e9152ff176cdc849d5ea6a9
-
SHA1
384a9ceaf5dc5cc4fafc61f32137d39fdfffd362
-
SHA256
a8550ef6b3660ccc7ae2d593c45c22775cf18b392f1b85e567dd720b0ef04b95
-
SHA512
63a1f5ce166559cd0ae895d76d6117fd28d6404c2f2bd1e710dfd94310b012417ab9a78312aa31a43eddf94ff1d47c4461a19c8ab69e9ffb3bd22e46971d52ad
-
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-