Analysis
-
max time kernel
73s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:36
Behavioral task
behavioral1
Sample
6miner-v0.1.0-x64-windows/6miner.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
6miner-v0.1.0-x64-windows/6miner.exe
-
Size
6.1MB
-
MD5
49880abbf0de9ba459065f03cd7992b1
-
SHA1
96fa63f06f35327b338c85b744c2e152d6a76c9d
-
SHA256
7c3ba3175d6d185f5ad6a7ea7709b66ed84a2e3766b9971d1b17eb8524a9a982
-
SHA512
84b5f02df90e0d0b5555a47056c6b875dbf00dc9c4d9101ff486a0d3f3f78a21fe30dd114920a32b04382d89edf3298bed6e0f687878eb628bf9df6e81fa0a4f
-
SSDEEP
98304:DRG1BqcRzmXkiDrWDcLSfSrTbrau2tDW0Tbv0MF8J0dh44q:Bwm1rWDcKSXMRUsQ0dh45
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/3900-132-0x00007FF7A6FD0000-0x00007FF7A7E8E000-memory.dmp vmprotect behavioral1/memory/3900-136-0x00007FF7A6FD0000-0x00007FF7A7E8E000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6miner.exepid process 3900 6miner.exe 3900 6miner.exe