General
-
Target
Injector.exe
-
Size
2.9MB
-
Sample
211021-aacemsaehm
-
MD5
b08ad9c7f95ff11da0b0b93543e35bbc
-
SHA1
da304fbd1bb1ff500355d1cde15bada5f42afa8c
-
SHA256
83183a8d40a911690ac0064964d07bac630a508a63a43b56fb61ed405d8d8900
-
SHA512
64475323852be6211ddbd74c2bd42fd961f117584f7b83cfbf931bc2fb6859db313b9fe9e0f9767555417d3113fd6d95826a4c68faf3f7264a282f0ec2097a3f
Static task
static1
Behavioral task
behavioral1
Sample
Injector.exe
Resource
win7-en-20211014
Malware Config
Targets
-
-
Target
Injector.exe
-
Size
2.9MB
-
MD5
b08ad9c7f95ff11da0b0b93543e35bbc
-
SHA1
da304fbd1bb1ff500355d1cde15bada5f42afa8c
-
SHA256
83183a8d40a911690ac0064964d07bac630a508a63a43b56fb61ed405d8d8900
-
SHA512
64475323852be6211ddbd74c2bd42fd961f117584f7b83cfbf931bc2fb6859db313b9fe9e0f9767555417d3113fd6d95826a4c68faf3f7264a282f0ec2097a3f
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
XMRig Miner Payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-