General
-
Target
80861d706dfddca16e7b919acc16304bc5ff3d239be1f36fe3c0d07323a38001
-
Size
153KB
-
Sample
210926-yxs8nsfcan
-
MD5
e5f2853120da2cbc825d9f939cbff419
-
SHA1
e8e9d04efeda444fd3c07ef60658969a6bfc14e7
-
SHA256
80861d706dfddca16e7b919acc16304bc5ff3d239be1f36fe3c0d07323a38001
-
SHA512
2204dc1bfa972c69b2517d0f8f300158650c44ae69ac53f2519450aeb80327ffe6958fcf948f6f3d3c8620ccf3912818a44ff3c4b5dca45a7849bf46626b493c
Static task
static1
Malware Config
Targets
-
-
Target
80861d706dfddca16e7b919acc16304bc5ff3d239be1f36fe3c0d07323a38001
-
Size
153KB
-
MD5
e5f2853120da2cbc825d9f939cbff419
-
SHA1
e8e9d04efeda444fd3c07ef60658969a6bfc14e7
-
SHA256
80861d706dfddca16e7b919acc16304bc5ff3d239be1f36fe3c0d07323a38001
-
SHA512
2204dc1bfa972c69b2517d0f8f300158650c44ae69ac53f2519450aeb80327ffe6958fcf948f6f3d3c8620ccf3912818a44ff3c4b5dca45a7849bf46626b493c
-
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
-
XMRig Miner Payload
-
Creates new service(s)
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Deletes itself
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-