General
-
Target
mamamiya137_ru_.bin.dll
-
Size
2.7MB
-
Sample
220908-3xahsagbe4
-
MD5
36c48ba4f231388a5f08fae2df0cec58
-
SHA1
3ba1d0aac10a41519610cf9166ab39b4c092d431
-
SHA256
fc33ed2f28a10b4b3cb775f7e699295f604d28bf3bf2cb2bc9185d002f89f91c
-
SHA512
4aa0e73f4eebfeb6cdeaf7cb0d050355185d3b8d91c044a911f895ec614ff0cb8b6d8e89ce3ea73052a4b55444ef1c7f72eaeabf2946a6bee8383ad03d93d4ee
-
SSDEEP
49152:Jzl1rpbUrqvv0v2rQVt8nqwI7lOOYc92ek:P1Kqvv07noI7lOOYcX
Static task
static1
Behavioral task
behavioral1
Sample
mamamiya137_ru_.bin.dll
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
mamamiya137_ru_.bin.dll
-
Size
2.7MB
-
MD5
36c48ba4f231388a5f08fae2df0cec58
-
SHA1
3ba1d0aac10a41519610cf9166ab39b4c092d431
-
SHA256
fc33ed2f28a10b4b3cb775f7e699295f604d28bf3bf2cb2bc9185d002f89f91c
-
SHA512
4aa0e73f4eebfeb6cdeaf7cb0d050355185d3b8d91c044a911f895ec614ff0cb8b6d8e89ce3ea73052a4b55444ef1c7f72eaeabf2946a6bee8383ad03d93d4ee
-
SSDEEP
49152:Jzl1rpbUrqvv0v2rQVt8nqwI7lOOYc92ek:P1Kqvv07noI7lOOYcX
-
Modifies security service
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Stops running service(s)
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-