General
-
Target
ffd963441ca84fc0a6eea19d19bdacdce6858b2652de639131b3115b998b344a
-
Size
5.3MB
-
Sample
240605-g4r6hsgd3t
-
MD5
5225f327614913372351bb7b7d1864e2
-
SHA1
e35d5ac15edebc12d259f0cbd4daf1387de2307e
-
SHA256
ffd963441ca84fc0a6eea19d19bdacdce6858b2652de639131b3115b998b344a
-
SHA512
5d827519c4f1ab9ddbb460ac268e825d5963486e572f2a3e1aa5efa93542d55ca766e0db60b665499e217d7b0a116a0f1f4d5a5218cc08759954d4b7c8710b09
-
SSDEEP
98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S
Static task
static1
Behavioral task
behavioral1
Sample
ffd963441ca84fc0a6eea19d19bdacdce6858b2652de639131b3115b998b344a.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
ffd963441ca84fc0a6eea19d19bdacdce6858b2652de639131b3115b998b344a
-
Size
5.3MB
-
MD5
5225f327614913372351bb7b7d1864e2
-
SHA1
e35d5ac15edebc12d259f0cbd4daf1387de2307e
-
SHA256
ffd963441ca84fc0a6eea19d19bdacdce6858b2652de639131b3115b998b344a
-
SHA512
5d827519c4f1ab9ddbb460ac268e825d5963486e572f2a3e1aa5efa93542d55ca766e0db60b665499e217d7b0a116a0f1f4d5a5218cc08759954d4b7c8710b09
-
SSDEEP
98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S
-
UPX dump on OEP (original entry point)
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-