General
-
Target
tmp/570e1dd9-aa39-41d6-9a37-1a1ff27b803b_ra4.exe
-
Size
8.4MB
-
Sample
211216-132s4schg8
-
MD5
fc878a1e87addcfc819a738f2f4b58f0
-
SHA1
3fe62a9844037951adda9aab5ce952b941033288
-
SHA256
e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f
-
SHA512
71da98d1086e4a8754d03592266e513e27a8ec4b8e252a7ca24a9278cd8eb0ed61d062a9a1b8f6b3b158c6f2b3465a1088e5b415feabf95a88f00d677ddd06e9
Static task
static1
Behavioral task
behavioral1
Sample
tmp/570e1dd9-aa39-41d6-9a37-1a1ff27b803b_ra4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
tmp/570e1dd9-aa39-41d6-9a37-1a1ff27b803b_ra4.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
tmp/570e1dd9-aa39-41d6-9a37-1a1ff27b803b_ra4.exe
-
Size
8.4MB
-
MD5
fc878a1e87addcfc819a738f2f4b58f0
-
SHA1
3fe62a9844037951adda9aab5ce952b941033288
-
SHA256
e414709eff086bf9652b2990488603a5346b60b8936c51c364e1130e5a5def0f
-
SHA512
71da98d1086e4a8754d03592266e513e27a8ec4b8e252a7ca24a9278cd8eb0ed61d062a9a1b8f6b3b158c6f2b3465a1088e5b415feabf95a88f00d677ddd06e9
Score10/10-
XMRig Miner Payload
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-