General
-
Target
d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9
-
Size
251KB
-
Sample
220704-rp5s6shgfn
-
MD5
fd2077eeebc5c2187791ce8a89c7ed0b
-
SHA1
2fb1a3902a00ce29a1693c1ca460e78c8739c33f
-
SHA256
d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9
-
SHA512
09895a250972f2ff3edde210a301e221e2705bd241012b2ad1e0e395e4935f2ef280b60c325b28080920738d2314a8ae5a873bbf7377736e770d1e44a3b844ed
Static task
static1
Behavioral task
behavioral1
Sample
d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9
-
Size
251KB
-
MD5
fd2077eeebc5c2187791ce8a89c7ed0b
-
SHA1
2fb1a3902a00ce29a1693c1ca460e78c8739c33f
-
SHA256
d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9
-
SHA512
09895a250972f2ff3edde210a301e221e2705bd241012b2ad1e0e395e4935f2ef280b60c325b28080920738d2314a8ae5a873bbf7377736e770d1e44a3b844ed
Score10/10-
XMRig Miner Payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-