General
-
Target
Miner100%.exe
-
Size
5.0MB
-
Sample
240612-rm2nqs1hnp
-
MD5
571dd056a02c1a863a0607fedf0185ba
-
SHA1
0f0d54e4987a0912ba4a9b539b166b5a844172dc
-
SHA256
f0876a44581eccbf9cc514de00fcb2336735f29d2e637e0027d9bbbc625b059f
-
SHA512
4b503d3ad690e2d682d3d1dc47aa3faf4127c597e72fefbfc203e7cb6bda4d29b91312d31231b4282573e06cc4193c513cd03c9c85e2e363aa04e57128d4e000
-
SSDEEP
98304:O4S3icr2ru4b5JXx/AnqLqpNfbb3+0L4mHro1pQ0a69g+TVc25BZ3vevM76u/7d2:bS3icr2ru4zx/AnqWT5lo1O0nTVHP3vb
Static task
static1
Behavioral task
behavioral1
Sample
Miner100%.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
Miner100%.exe
-
Size
5.0MB
-
MD5
571dd056a02c1a863a0607fedf0185ba
-
SHA1
0f0d54e4987a0912ba4a9b539b166b5a844172dc
-
SHA256
f0876a44581eccbf9cc514de00fcb2336735f29d2e637e0027d9bbbc625b059f
-
SHA512
4b503d3ad690e2d682d3d1dc47aa3faf4127c597e72fefbfc203e7cb6bda4d29b91312d31231b4282573e06cc4193c513cd03c9c85e2e363aa04e57128d4e000
-
SSDEEP
98304:O4S3icr2ru4b5JXx/AnqLqpNfbb3+0L4mHro1pQ0a69g+TVc25BZ3vevM76u/7d2:bS3icr2ru4zx/AnqWT5lo1O0nTVHP3vb
Score10/10-
XMRig Miner payload
-
Accesses Microsoft Outlook profiles
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-