General
-
Target
reghost.exe
-
Size
2.5MB
-
Sample
240404-xwcc4agd58
-
MD5
3243902becd4fce3f65be459aef674a1
-
SHA1
963ddcc8bbc5d1d345546219d9db7f19c86993ed
-
SHA256
c2ad8e004cbc781c01a19e8761dc9c325b937020830e1295b5eb3dd24c1710e1
-
SHA512
20e63d888df95c7ad29d76d92b438981186015f32a5f7bb08568c09409c62b7f8fd14560deaa337faecfac0df264e189915eea040a2eb534d2d0a08bd6954add
-
SSDEEP
49152:oXpa/937SR/wufh+2TY4fFnYUtTmiHW9OWLTyWI5zjn4psD:oXpa/9Lyd+2TYRU72nLGhjnIA
Static task
static1
Behavioral task
behavioral1
Sample
reghost.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
reghost.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
reghost.exe
-
Size
2.5MB
-
MD5
3243902becd4fce3f65be459aef674a1
-
SHA1
963ddcc8bbc5d1d345546219d9db7f19c86993ed
-
SHA256
c2ad8e004cbc781c01a19e8761dc9c325b937020830e1295b5eb3dd24c1710e1
-
SHA512
20e63d888df95c7ad29d76d92b438981186015f32a5f7bb08568c09409c62b7f8fd14560deaa337faecfac0df264e189915eea040a2eb534d2d0a08bd6954add
-
SSDEEP
49152:oXpa/937SR/wufh+2TY4fFnYUtTmiHW9OWLTyWI5zjn4psD:oXpa/9Lyd+2TYRU72nLGhjnIA
Score10/10-
XMRig Miner payload
-
Creates new service(s)
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-