General
-
Target
2b5787435c3182b39b96615bf5e1e0a8c6573c5a7330ccc48daa956f008bd383
-
Size
2.0MB
-
Sample
240312-xlytcagf6x
-
MD5
714a5848aefb7f430f178f12142a7b42
-
SHA1
7b472d7d5ee63c39ea0237b1f35cdecd694b6487
-
SHA256
2b5787435c3182b39b96615bf5e1e0a8c6573c5a7330ccc48daa956f008bd383
-
SHA512
2f3d4a582104a0d6cea50f3aea2d4d41548c7f5062cc9fe84e21c121241fef232a73becb64cf99d9a1b9e95c3205a553ee33d6090ddcd317b7b9c51aa919d32e
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXQo6Ut:NABj
Behavioral task
behavioral1
Sample
2b5787435c3182b39b96615bf5e1e0a8c6573c5a7330ccc48daa956f008bd383.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2b5787435c3182b39b96615bf5e1e0a8c6573c5a7330ccc48daa956f008bd383
-
Size
2.0MB
-
MD5
714a5848aefb7f430f178f12142a7b42
-
SHA1
7b472d7d5ee63c39ea0237b1f35cdecd694b6487
-
SHA256
2b5787435c3182b39b96615bf5e1e0a8c6573c5a7330ccc48daa956f008bd383
-
SHA512
2f3d4a582104a0d6cea50f3aea2d4d41548c7f5062cc9fe84e21c121241fef232a73becb64cf99d9a1b9e95c3205a553ee33d6090ddcd317b7b9c51aa919d32e
-
SSDEEP
49152:Lz071uv4BPMkibTIA5lCx7kvRWa4pXQo6Ut:NABj
-
Detects executables containing URLs to raw contents of a Github gist
-
UPX dump on OEP (original entry point)
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-