General
-
Target
16ad4d43b7af293cf043eaea47f1e539
-
Size
3.9MB
-
Sample
231230-m5ppnsgcb2
-
MD5
16ad4d43b7af293cf043eaea47f1e539
-
SHA1
4ee4032e211c3a73e1f51d413aaec227330b75af
-
SHA256
84984691eaaa25532f248628b4b32d6b3e2927bb84e7f42155ffe5f7abfbd75e
-
SHA512
06fd8205c8943056a327df5096134a245741118a3d6bf791ee35142cc7f3744809051803279544c84e776934e27379715cd204658d1eb174bb02e43d866954d4
-
SSDEEP
49152:NJ3eK3E7NSpHceAcmlcURiy8rfnptKNhi:n3Ekocm668fCNs
Static task
static1
Behavioral task
behavioral1
Sample
16ad4d43b7af293cf043eaea47f1e539.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16ad4d43b7af293cf043eaea47f1e539.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
16ad4d43b7af293cf043eaea47f1e539
-
Size
3.9MB
-
MD5
16ad4d43b7af293cf043eaea47f1e539
-
SHA1
4ee4032e211c3a73e1f51d413aaec227330b75af
-
SHA256
84984691eaaa25532f248628b4b32d6b3e2927bb84e7f42155ffe5f7abfbd75e
-
SHA512
06fd8205c8943056a327df5096134a245741118a3d6bf791ee35142cc7f3744809051803279544c84e776934e27379715cd204658d1eb174bb02e43d866954d4
-
SSDEEP
49152:NJ3eK3E7NSpHceAcmlcURiy8rfnptKNhi:n3Ekocm668fCNs
-
XMRig Miner payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-