General
-
Target
86523374.exe
-
Size
5.2MB
-
Sample
220320-fzvv6sheb3
-
MD5
23c2521d2d7f41cdc515db9c7a7d6dcb
-
SHA1
ba422cc6f49b1639d35d61ea9ddec24149649929
-
SHA256
e2d81a70b783df979b49f9caf84b20076533e37068b2db60e6d589eec5bacee4
-
SHA512
486ce40687b16f67d8f1473ecc31aadd979fff43bc836b48d502efcf5eb91e1de60f3e47c0e1df0592b17bf7992016c13534fdd2c5afb2b3f1f4482262340bfa
Static task
static1
Behavioral task
behavioral1
Sample
86523374.exe
Resource
win7-20220310-en
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/934716186313240606/NIuB64dK4IPafrX9FRy2wNNRrBnOxvdLjio6Ou2fEKxC9HrdYgZQcnvkOx-a4O9pNzdW
Targets
-
-
Target
86523374.exe
-
Size
5.2MB
-
MD5
23c2521d2d7f41cdc515db9c7a7d6dcb
-
SHA1
ba422cc6f49b1639d35d61ea9ddec24149649929
-
SHA256
e2d81a70b783df979b49f9caf84b20076533e37068b2db60e6d589eec5bacee4
-
SHA512
486ce40687b16f67d8f1473ecc31aadd979fff43bc836b48d502efcf5eb91e1de60f3e47c0e1df0592b17bf7992016c13534fdd2c5afb2b3f1f4482262340bfa
-
XMRig Miner Payload
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-