General
-
Target
rhfinal.exe
-
Size
307KB
-
Sample
230112-fqd63aba8t
-
MD5
32ad696ddbb245210e041fac7a0b805f
-
SHA1
f6847a97a3139a1d11a4a29ccdc91c61e7d473bd
-
SHA256
cbc57ef2acb08283ea450ecc433dfb1db30b418828392e22b0670fb47b6d4bd3
-
SHA512
e2ada8d51b9bbe28fa6130b881bbfbb8d3318daf90a6f7be6de79a818b1448a2530b00d9d7faeef47b4c75112a70363f210cbed47a9bdc33b3ae7360c4b34481
-
SSDEEP
6144:K8y+bnr+op0yN90QEcIxUrwu5k0NH3Z/856UbYec:sMrgy90Orwu5vJ/UhYec
Static task
static1
Behavioral task
behavioral1
Sample
rhfinal.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
rhfinal.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
rhfinal.exe
-
Size
307KB
-
MD5
32ad696ddbb245210e041fac7a0b805f
-
SHA1
f6847a97a3139a1d11a4a29ccdc91c61e7d473bd
-
SHA256
cbc57ef2acb08283ea450ecc433dfb1db30b418828392e22b0670fb47b6d4bd3
-
SHA512
e2ada8d51b9bbe28fa6130b881bbfbb8d3318daf90a6f7be6de79a818b1448a2530b00d9d7faeef47b4c75112a70363f210cbed47a9bdc33b3ae7360c4b34481
-
SSDEEP
6144:K8y+bnr+op0yN90QEcIxUrwu5k0NH3Z/856UbYec:sMrgy90Orwu5vJ/UhYec
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-