General
-
Target
02c2f7c0aa319c0d657f13416f6b0ab894908dea1d5b8a8d861bca68987d01db
-
Size
217KB
-
Sample
210926-q7gzdseghq
-
MD5
edacf50354a9e6e50955d4d75dc9d3fc
-
SHA1
e55be89d83db2c861881ea464a3bf6323b26c4f5
-
SHA256
02c2f7c0aa319c0d657f13416f6b0ab894908dea1d5b8a8d861bca68987d01db
-
SHA512
5cbbf27ac3faf2f065f0408abdee478433e0193872fbebcb46411b3fa8c625d84f44348e64aa1a2ceac2310dcd60941f0fad47d5d40475e2fccc6b13cfc6521b
Static task
static1
Malware Config
Targets
-
-
Target
02c2f7c0aa319c0d657f13416f6b0ab894908dea1d5b8a8d861bca68987d01db
-
Size
217KB
-
MD5
edacf50354a9e6e50955d4d75dc9d3fc
-
SHA1
e55be89d83db2c861881ea464a3bf6323b26c4f5
-
SHA256
02c2f7c0aa319c0d657f13416f6b0ab894908dea1d5b8a8d861bca68987d01db
-
SHA512
5cbbf27ac3faf2f065f0408abdee478433e0193872fbebcb46411b3fa8c625d84f44348e64aa1a2ceac2310dcd60941f0fad47d5d40475e2fccc6b13cfc6521b
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-