General
-
Target
62451199b2f6fad4f345a5c3b4d7ece0c3b458fd85adbb1e802ea122c1170128
-
Size
5.1MB
-
Sample
220310-qsmakafcb7
-
MD5
2394239524d152a87311e91311ab0abb
-
SHA1
784942496518b70fce9b81d5e85c2ea95bb0c89b
-
SHA256
62451199b2f6fad4f345a5c3b4d7ece0c3b458fd85adbb1e802ea122c1170128
-
SHA512
d75ca0028286079fc592f0704077cdebcde4f9c55a11350df521d70a97169a12aef2275be8cd408132620f418f9f5c5833bf6b21e837615f80f3afb193a01bb6
Static task
static1
Behavioral task
behavioral1
Sample
62451199b2f6fad4f345a5c3b4d7ece0c3b458fd85adbb1e802ea122c1170128.exe
Resource
win7-20220223-en
Malware Config
Extracted
bitrat
1.35
gumerez.xyz:1991
-
communication_password
c3e91d7657b11293c58a2efd9aa9262d
-
tor_process
tor
Targets
-
-
Target
62451199b2f6fad4f345a5c3b4d7ece0c3b458fd85adbb1e802ea122c1170128
-
Size
5.1MB
-
MD5
2394239524d152a87311e91311ab0abb
-
SHA1
784942496518b70fce9b81d5e85c2ea95bb0c89b
-
SHA256
62451199b2f6fad4f345a5c3b4d7ece0c3b458fd85adbb1e802ea122c1170128
-
SHA512
d75ca0028286079fc592f0704077cdebcde4f9c55a11350df521d70a97169a12aef2275be8cd408132620f418f9f5c5833bf6b21e837615f80f3afb193a01bb6
-
Modifies WinLogon for persistence
-
r77 rootkit payload
Detects the payload of the r77 rootkit.
-
XMRig Miner Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-