General
-
Target
e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886.zip
-
Size
4.5MB
-
Sample
230308-nfswgafh65
-
MD5
46e048904c6554042a1e444a757cb6e7
-
SHA1
46f47885f7e09ecfdcac1777f5d8734c2e46807e
-
SHA256
8c7584f4742ce65851ca507099a58ad6fa0dacb9c6b7c8eb45494acd096e19fc
-
SHA512
9896719d2ae1798a5e7791a6b0b7b38f53e413678414bfcc6372898effd5cc5755c684ab2891bd1833659515d2019e150332c35a6fab382ad553492f8104c336
-
SSDEEP
98304:IEnXIIyK4CnI/F+Tcug3lMbRsaTuJEXiBlKNM/XIif:bYse+TcVcvsnTH/7
Static task
static1
Behavioral task
behavioral1
Sample
e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886.exe
Resource
win7-20230220-en
Malware Config
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Targets
-
-
Target
e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886.exe
-
Size
5.1MB
-
MD5
e9ae314f7427e5ea9c2cc839831cf4cc
-
SHA1
dca2ce2f88279cb4aba64d69f90e076ed8959151
-
SHA256
e024899665b99b66cafd62c809e354256556d2189aeaf995160849dedb1dc886
-
SHA512
311971ff2160af9a947ab6e5192767c5420072f66c6d3ec77eb8aa9362a9517d4095941fe959589cd66cf7b9da07e75ac183e03505323707c761d96dbac11510
-
SSDEEP
98304:vT4pPO5Gn4SOAjkSvBTaPX+alSeReNBoDVF9of55zVM3TcfAtiZvk4Ul:vT62IBTamNPWOiQfB
-
Modifies security service
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-