General
-
Target
spell.exe
-
Size
2.1MB
-
Sample
240629-cetkts1gnj
-
MD5
ac109c80097d1d932ab66fc11e19b61f
-
SHA1
2d8eb980764fae4a728431e32321609a45f6741d
-
SHA256
dd5a76a2520d25db4010b9c27e6e6b3033995b72b18954f095215e08137850f6
-
SHA512
bb893cc7cb0eee04048390d92515dcf3e689eea15e67d8b461b26720d8ab2d127afc55cb006ab2088454346fb506f0a2e09004740b736da3f3bfacc5461f1b58
-
SSDEEP
49152:Get5GEw9XDPGmUI/LVuSO5q2OCvBc6laoCBpsFC6:HRw9XDuZI/YDlOCZc6la3sY6
Static task
static1
Behavioral task
behavioral1
Sample
spell.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
spell.exe
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
spell.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
spell.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
spell.exe
-
Size
2.1MB
-
MD5
ac109c80097d1d932ab66fc11e19b61f
-
SHA1
2d8eb980764fae4a728431e32321609a45f6741d
-
SHA256
dd5a76a2520d25db4010b9c27e6e6b3033995b72b18954f095215e08137850f6
-
SHA512
bb893cc7cb0eee04048390d92515dcf3e689eea15e67d8b461b26720d8ab2d127afc55cb006ab2088454346fb506f0a2e09004740b736da3f3bfacc5461f1b58
-
SSDEEP
49152:Get5GEw9XDPGmUI/LVuSO5q2OCvBc6laoCBpsFC6:HRw9XDuZI/YDlOCZc6la3sY6
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-