General
-
Target
script.ps1
-
Size
148B
-
Sample
240705-eqjacavclb
-
MD5
aa65eb2fe66fba481e2718e252efe667
-
SHA1
f2af6ec4b13215dbdfc9bc2e167dfe08e7be4579
-
SHA256
44fde76cec9761d8e63e4a5908fc0b9e491a8bd1a93e792e637d346a62e1b6cd
-
SHA512
9898936a9f41239d112c1d085c86fcc840058e7a6347666eef2de61d953d04c9c5cb7ac5825c475d227de1d2d79b2391d0f2e0b1a26006b8e9947b42af90808b
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
script.ps1
Resource
win10v2004-20240704-en
Malware Config
Extracted
http://185.254.97.190:2024/test.txt
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip
Targets
-
-
Target
script.ps1
-
Size
148B
-
MD5
aa65eb2fe66fba481e2718e252efe667
-
SHA1
f2af6ec4b13215dbdfc9bc2e167dfe08e7be4579
-
SHA256
44fde76cec9761d8e63e4a5908fc0b9e491a8bd1a93e792e637d346a62e1b6cd
-
SHA512
9898936a9f41239d112c1d085c86fcc840058e7a6347666eef2de61d953d04c9c5cb7ac5825c475d227de1d2d79b2391d0f2e0b1a26006b8e9947b42af90808b
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-