General
-
Target
trigger.ps1
-
Size
148B
-
Sample
240704-3xlaaawgmq
-
MD5
f894b24ca3109bdc8167d849a1e19660
-
SHA1
5d295d603c423498aa3c80fcd35e328df13fd7fc
-
SHA256
e68ae28adfa6a3fb898e890520e0c3eda33dbbe071d5503b4eeb440c93cd538a
-
SHA512
0b8ee8cc214b559e79a6c0029ac2cd4df6a8c5a8dc22f756632bbdacee996cca023a20944e8a0117ba285ddd201c128a9184ab57210f0dd6e4c2a7eddb108ee9
Static task
static1
Behavioral task
behavioral1
Sample
trigger.ps1
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
trigger.ps1
Resource
win10v2004-20240704-en
Malware Config
Extracted
http://185.254.97.190:2024/test.txt
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip
Targets
-
-
Target
trigger.ps1
-
Size
148B
-
MD5
f894b24ca3109bdc8167d849a1e19660
-
SHA1
5d295d603c423498aa3c80fcd35e328df13fd7fc
-
SHA256
e68ae28adfa6a3fb898e890520e0c3eda33dbbe071d5503b4eeb440c93cd538a
-
SHA512
0b8ee8cc214b559e79a6c0029ac2cd4df6a8c5a8dc22f756632bbdacee996cca023a20944e8a0117ba285ddd201c128a9184ab57210f0dd6e4c2a7eddb108ee9
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-