General
-
Target
e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f
-
Size
8.4MB
-
Sample
211215-wy3sdsbbdp
-
MD5
fc878a1e87addcfc819a738f2f4b58f0
-
SHA1
3fe62a9844037951adda9aab5ce952b941033288
-
SHA256
e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f
-
SHA512
71da98d1086e4a8754d03592266e513e27a8ec4b8e252a7ca24a9278cd8eb0ed61d062a9a1b8f6b3b158c6f2b3465a1088e5b415feabf95a88f00d677ddd06e9
Static task
static1
Malware Config
Targets
-
-
Target
e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f
-
Size
8.4MB
-
MD5
fc878a1e87addcfc819a738f2f4b58f0
-
SHA1
3fe62a9844037951adda9aab5ce952b941033288
-
SHA256
e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f
-
SHA512
71da98d1086e4a8754d03592266e513e27a8ec4b8e252a7ca24a9278cd8eb0ed61d062a9a1b8f6b3b158c6f2b3465a1088e5b415feabf95a88f00d677ddd06e9
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
XMRig Miner Payload
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-