General
-
Target
c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71
-
Size
2.8MB
-
Sample
240603-q3mdbahh63
-
MD5
c313d79bb52d3dc1a0fdd298a6c47810
-
SHA1
0acb3c5b6a6bd568656c7dc9f2bebaf0ea01207a
-
SHA256
c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71
-
SHA512
c937b08e72578c71d79387dbb625436e7381b784a8a3977a50cc758de8badfc57e8c566db135aa1e6f1ea01b682c4675302ee25c4f74e60238ca2c4714834a08
-
SSDEEP
49152:VIf2lo986T2njmZHDIkduvYcg9/YyCBGQPDK2z3fANo7+VnAeRq8HBaegPzcxCnG:VIKdiZvdPf2DGQ7L3gR7HBaegPzcxCnG
Static task
static1
Behavioral task
behavioral1
Sample
c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71
-
Size
2.8MB
-
MD5
c313d79bb52d3dc1a0fdd298a6c47810
-
SHA1
0acb3c5b6a6bd568656c7dc9f2bebaf0ea01207a
-
SHA256
c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71
-
SHA512
c937b08e72578c71d79387dbb625436e7381b784a8a3977a50cc758de8badfc57e8c566db135aa1e6f1ea01b682c4675302ee25c4f74e60238ca2c4714834a08
-
SSDEEP
49152:VIf2lo986T2njmZHDIkduvYcg9/YyCBGQPDK2z3fANo7+VnAeRq8HBaegPzcxCnG:VIKdiZvdPf2DGQ7L3gR7HBaegPzcxCnG
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-