General
-
Target
file.exe
-
Size
779KB
-
Sample
230411-yhhtdsge3x
-
MD5
0d09bab273d2e6e9ddfe98be63a6500c
-
SHA1
4af9a996d3a6359cb5870c5eba93b53d91e48c20
-
SHA256
6b4bdd66b03091c41c55b66b2dcb706bcfbea63d9edb7b711dd99e377ae9f863
-
SHA512
bf9303258982c1ff5cd325b2dcff5797189d7dc13438f2e15967e5da78af8d62e4500225985129e1a6bc85285979de044d50cd81086492e33777c31b87e75990
-
SSDEEP
12288:+ihzIYnerNITYUF0BPbrmQNpglLtODCGbBPN1g15YpCok9t9hGSDdz0kz:+Mneh+abrVpglJ8/a5YpCBH5DdJz
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
779KB
-
MD5
0d09bab273d2e6e9ddfe98be63a6500c
-
SHA1
4af9a996d3a6359cb5870c5eba93b53d91e48c20
-
SHA256
6b4bdd66b03091c41c55b66b2dcb706bcfbea63d9edb7b711dd99e377ae9f863
-
SHA512
bf9303258982c1ff5cd325b2dcff5797189d7dc13438f2e15967e5da78af8d62e4500225985129e1a6bc85285979de044d50cd81086492e33777c31b87e75990
-
SSDEEP
12288:+ihzIYnerNITYUF0BPbrmQNpglLtODCGbBPN1g15YpCok9t9hGSDdz0kz:+Mneh+abrVpglJ8/a5YpCBH5DdJz
-
XMRig Miner payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-