General
-
Target
SimilarMinera_216fdfc8c6d0cb1bd6803766a9cba13c8a9085d28be87d20227934cdd36072c0.bin.exe
-
Size
566KB
-
Sample
220328-qh282aacb8
-
MD5
e57371ccf3a52c307865c55afbef572a
-
SHA1
051b676e10b153b74d1e58ef722969b05b2d3bea
-
SHA256
216fdfc8c6d0cb1bd6803766a9cba13c8a9085d28be87d20227934cdd36072c0
-
SHA512
a3433f38538fcccb0edd91db0581854d5976cfb078fdf7157031ae26292d43e852760ef48c7e80f63ff9649cf48f62231ee940ca3ae2c5633e3f205807ff5691
Static task
static1
Behavioral task
behavioral1
Sample
SimilarMinera_216fdfc8c6d0cb1bd6803766a9cba13c8a9085d28be87d20227934cdd36072c0.bin.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
SimilarMinera_216fdfc8c6d0cb1bd6803766a9cba13c8a9085d28be87d20227934cdd36072c0.bin.exe
-
Size
566KB
-
MD5
e57371ccf3a52c307865c55afbef572a
-
SHA1
051b676e10b153b74d1e58ef722969b05b2d3bea
-
SHA256
216fdfc8c6d0cb1bd6803766a9cba13c8a9085d28be87d20227934cdd36072c0
-
SHA512
a3433f38538fcccb0edd91db0581854d5976cfb078fdf7157031ae26292d43e852760ef48c7e80f63ff9649cf48f62231ee940ca3ae2c5633e3f205807ff5691
Score10/10-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-