General
-
Target
e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e
-
Size
987KB
-
Sample
230508-3qbghafb8v
-
MD5
f69660e01c5042b49fc54d40dbe5ed85
-
SHA1
90a201a5c46cb0836078c4decac08b1d2fdf946a
-
SHA256
e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e
-
SHA512
b5230e013371304312576c749254d580b52b2457ffefd125a0562199a18872490c4a6a8d430659db9be40ba4e645870ae83a48a39d36a0ea58496f1b84b31238
-
SSDEEP
12288:lToPWBv/cpGrU3y4CDk2VCJl5stacV9u9QDCNy+scbYVlpwUnqSaqJVt2eEkcVw0:lTbBv5rUqDC3YmJYVwYIqcRyw
Static task
static1
Behavioral task
behavioral1
Sample
e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
eternity
48zNQwXLksrS7S3ohbWAKRTYWu5htM4FG4sa9iz6LzgWj6ebFQzyJe9aWJbw4nsHR7KQyDrXKG6bxKQTJdj9Uhu138L9FDz
-
payload_urls
http://81.161.229.110:8080/upload/xmrig.exe
Targets
-
-
Target
e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e
-
Size
987KB
-
MD5
f69660e01c5042b49fc54d40dbe5ed85
-
SHA1
90a201a5c46cb0836078c4decac08b1d2fdf946a
-
SHA256
e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e
-
SHA512
b5230e013371304312576c749254d580b52b2457ffefd125a0562199a18872490c4a6a8d430659db9be40ba4e645870ae83a48a39d36a0ea58496f1b84b31238
-
SSDEEP
12288:lToPWBv/cpGrU3y4CDk2VCJl5stacV9u9QDCNy+scbYVlpwUnqSaqJVt2eEkcVw0:lTbBv5rUqDC3YmJYVwYIqcRyw
Score10/10-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
XMRig Miner payload
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-