General
-
Target
HEUR-Trojan.Win32.Generic-86460637503de8a8e9bce05779c24dfebd069abe5bf3ae54f374c1fb37de3a95
-
Size
1.8MB
-
Sample
240229-jqc6jsba63
-
MD5
f9c69440c9da179fbdc774992e4d3c11
-
SHA1
19254469477cc40afbff32057e798ed91805464d
-
SHA256
86460637503de8a8e9bce05779c24dfebd069abe5bf3ae54f374c1fb37de3a95
-
SHA512
1c5e9b672e88184cdde134c5db69a2b8bddc9b0410a645e3191ef9e0653005a2c44a7327ee881f5b6418f6c77083a1b8f03bedabf95e9b4b79f67854cbc5365b
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pCkcBUF:NABF
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
HEUR-Trojan.Win32.Generic-86460637503de8a8e9bce05779c24dfebd069abe5bf3ae54f374c1fb37de3a95
-
Size
1.8MB
-
MD5
f9c69440c9da179fbdc774992e4d3c11
-
SHA1
19254469477cc40afbff32057e798ed91805464d
-
SHA256
86460637503de8a8e9bce05779c24dfebd069abe5bf3ae54f374c1fb37de3a95
-
SHA512
1c5e9b672e88184cdde134c5db69a2b8bddc9b0410a645e3191ef9e0653005a2c44a7327ee881f5b6418f6c77083a1b8f03bedabf95e9b4b79f67854cbc5365b
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pCkcBUF:NABF
-
Detects executables containing URLs to raw contents of a Github gist
-
UPX dump on OEP (original entry point)
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-