General
-
Target
512415531e7f3ef14143d8ebb3c9fd804bb3a33dd907ac676364c6fabdf99871.zip
-
Size
211KB
-
Sample
240417-g858yahe21
-
MD5
94d74774b6c0f4b15d365f21ed6f8b65
-
SHA1
ce974fec2cf84dd0e7154c101267aa87b4916483
-
SHA256
992418223c75419c5052236a46a7cbb7a4855e5402ede0f2452cf0d7d69df1c4
-
SHA512
2f6f9b1462f9a76d5880409384ddd518d4b457e4f273a894a0f9d63b009d66c8485435ebb4173f71b41524a50b11a538af916e53bda529739747826faf1c38cf
-
SSDEEP
6144:FcjEchtp3fKmUVQe3VUYuuafG4XSWZv7p:FOhttKmUie3V2ua6qF
Behavioral task
behavioral1
Sample
512415531e7f3ef14143d8ebb3c9fd804bb3a33dd907ac676364c6fabdf99871.exe
Resource
win7-20240221-en
Malware Config
Extracted
loaderbot
http://ih803741.myihor.ru/cmd.php
Targets
-
-
Target
512415531e7f3ef14143d8ebb3c9fd804bb3a33dd907ac676364c6fabdf99871
-
Size
448KB
-
MD5
0d96da9c38b21d97fce1528e7dc1af7c
-
SHA1
1b9b049440b495a9378df502686341734ff167b9
-
SHA256
512415531e7f3ef14143d8ebb3c9fd804bb3a33dd907ac676364c6fabdf99871
-
SHA512
d0511c6dee7001ec9e6f5de471d57870536f9e14a943cbb9ffab4df5252b27625ccad59904a2870767410082d6fb4e804169ebf523e4b1e0334b6ff065c2811a
-
SSDEEP
12288:5i3Q+jkZaZJEeDoS/8+tR7HFVaX4zqhfkH:5i3Q+jkkDoS/8+tNvzAu
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-