General
-
Target
Loader.exe
-
Size
5.0MB
-
Sample
220814-dn17pshbfn
-
MD5
99cb59399f9bf0a8a656979a082e0f76
-
SHA1
050eb916467e1d056792bcd5173b0322c843a234
-
SHA256
790fd3d09fa9f0249961434cfcad34cd9cef2725d141700151b679831cfb9ee6
-
SHA512
33bbb570f10b15c43ff3af6c946fa8079f54454360f5e004903a4ecbfe5439e93e3f2d1c599f580a01bb7e36268607a6d5bdc662df29b432299b8b934be2530c
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
Loader.exe
-
Size
5.0MB
-
MD5
99cb59399f9bf0a8a656979a082e0f76
-
SHA1
050eb916467e1d056792bcd5173b0322c843a234
-
SHA256
790fd3d09fa9f0249961434cfcad34cd9cef2725d141700151b679831cfb9ee6
-
SHA512
33bbb570f10b15c43ff3af6c946fa8079f54454360f5e004903a4ecbfe5439e93e3f2d1c599f580a01bb7e36268607a6d5bdc662df29b432299b8b934be2530c
-
Modifies security service
-
XMRig Miner payload
-
Executes dropped EXE
-
Possible privilege escalation attempt
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Modifies file permissions
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-