Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 13:14
Behavioral task
behavioral1
Sample
2024-05-25_9b136ad024ff15f1c56512a65e9661fe_cobalt-strike_cobaltstrike_poet-rat_xmrig.exe
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
2024-05-25_9b136ad024ff15f1c56512a65e9661fe_cobalt-strike_cobaltstrike_poet-rat_xmrig.exe
-
Size
10.8MB
-
MD5
9b136ad024ff15f1c56512a65e9661fe
-
SHA1
49513c3a9b7410536a2f0a85e828ac5a902caafe
-
SHA256
e15b506593edd27ea5fec7abfd46146c7d4057ef614a121d95fd80aa83750048
-
SHA512
6b38129b18cac802222cf642005d1778ce680fce9402a4a0006e6bac905bd0e6c54cfd82b45b136555f8a2bce3093f07b7df195e32859c8f99ab0575e1fe6c23
-
SSDEEP
196608:m2XrSIqtPazmgL7uDbzV0xpZr8o37nmPQLi7gCsLDY:maWIPyquDCzzmPfgCZ
Malware Config
Signatures
-
Detects executables containing URLs to raw contents of a Github gist 1 IoCs
resource yara_rule behavioral2/memory/1904-5-0x0000000000400000-0x00000000010B2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/1904-5-0x0000000000400000-0x00000000010B2000-memory.dmp xmrig