General
-
Target
run.ps1
-
Size
148B
-
Sample
240704-3g6laaxhla
-
MD5
35df5daf87631b90f1dc95b28f2aab88
-
SHA1
53c90c5e0a065aa759c21553dd04c7c9608c8e57
-
SHA256
ba151137a19e19d83e6bf4653ebcd1a9b4669e7cc0a921723514561881d900b7
-
SHA512
160afcc2dffe56fdaedd233571d9c74806681200c0072dd1cecf63af93e36554075abdac44bcec0e2d5d2b36c1321b265e5e0826cb4e41353d25cefc847c5eb2
Static task
static1
Behavioral task
behavioral1
Sample
run.ps1
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
run.ps1
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://185.254.97.190:2024/test.txt
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip
Targets
-
-
Target
run.ps1
-
Size
148B
-
MD5
35df5daf87631b90f1dc95b28f2aab88
-
SHA1
53c90c5e0a065aa759c21553dd04c7c9608c8e57
-
SHA256
ba151137a19e19d83e6bf4653ebcd1a9b4669e7cc0a921723514561881d900b7
-
SHA512
160afcc2dffe56fdaedd233571d9c74806681200c0072dd1cecf63af93e36554075abdac44bcec0e2d5d2b36c1321b265e5e0826cb4e41353d25cefc847c5eb2
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-