General
-
Target
b87f28d6e62d7cf38d47e12bbc930aac78fdb25ee64e4fdd350c011bfe73f488
-
Size
5.3MB
-
Sample
240630-bpbbka1fjb
-
MD5
267a9619a671a83fccbe21ed863570d5
-
SHA1
e254fbf62da28079869193b0c2ecbdaf850e677d
-
SHA256
b87f28d6e62d7cf38d47e12bbc930aac78fdb25ee64e4fdd350c011bfe73f488
-
SHA512
cb48bec02a86620bdbae640313cf149a76d2349f5277cb9e8d80c894f2a46e7e7a399d9658fe86ce83eef75bf8849350103bf95085f2a2cfd81d87860a88f4c3
-
SSDEEP
98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S
Static task
static1
Behavioral task
behavioral1
Sample
b87f28d6e62d7cf38d47e12bbc930aac78fdb25ee64e4fdd350c011bfe73f488.exe
Resource
win7-20240611-en
Malware Config
Targets
-
-
Target
b87f28d6e62d7cf38d47e12bbc930aac78fdb25ee64e4fdd350c011bfe73f488
-
Size
5.3MB
-
MD5
267a9619a671a83fccbe21ed863570d5
-
SHA1
e254fbf62da28079869193b0c2ecbdaf850e677d
-
SHA256
b87f28d6e62d7cf38d47e12bbc930aac78fdb25ee64e4fdd350c011bfe73f488
-
SHA512
cb48bec02a86620bdbae640313cf149a76d2349f5277cb9e8d80c894f2a46e7e7a399d9658fe86ce83eef75bf8849350103bf95085f2a2cfd81d87860a88f4c3
-
SSDEEP
98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S
-
UPX dump on OEP (original entry point)
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-