General
-
Target
3f030f1c326b5757a89c8ef4e501c2c2fe4815cf48a5c12a08121b9535028dd5.exe
-
Size
1.7MB
-
Sample
240704-e56desvckn
-
MD5
4c85442ea5fdeabe5bcd2b6067bc67d0
-
SHA1
17ddc98b083f1bcb469c371f7cd5dc26e2977d0d
-
SHA256
3f030f1c326b5757a89c8ef4e501c2c2fe4815cf48a5c12a08121b9535028dd5
-
SHA512
3328b0c2121553ad1efb0fd6c4d21e73ef3f6b55f5bbe77b3f1089bbcf41c292bb3208deb198e8b349a8470c4a096f714de83acd4bcad3ffd81cbe96d789a3de
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWY1s38kQu12bPxvyuzaBgJ9pcFt5:Lz071uv4BPMkibTIA5I4TNrpDGK4n
Behavioral task
behavioral1
Sample
3f030f1c326b5757a89c8ef4e501c2c2fe4815cf48a5c12a08121b9535028dd5.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3f030f1c326b5757a89c8ef4e501c2c2fe4815cf48a5c12a08121b9535028dd5.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
3f030f1c326b5757a89c8ef4e501c2c2fe4815cf48a5c12a08121b9535028dd5.exe
-
Size
1.7MB
-
MD5
4c85442ea5fdeabe5bcd2b6067bc67d0
-
SHA1
17ddc98b083f1bcb469c371f7cd5dc26e2977d0d
-
SHA256
3f030f1c326b5757a89c8ef4e501c2c2fe4815cf48a5c12a08121b9535028dd5
-
SHA512
3328b0c2121553ad1efb0fd6c4d21e73ef3f6b55f5bbe77b3f1089bbcf41c292bb3208deb198e8b349a8470c4a096f714de83acd4bcad3ffd81cbe96d789a3de
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWY1s38kQu12bPxvyuzaBgJ9pcFt5:Lz071uv4BPMkibTIA5I4TNrpDGK4n
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Accessibility Features
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Accessibility Features
1