General
-
Target
trigger.ps1
-
Size
148B
-
Sample
240705-nrtl5szerd
-
MD5
5c83a346dccf035feb252605de22f437
-
SHA1
9fa30e0c65283ea3b1c3e9e738ff952baee54606
-
SHA256
783aa303eb647471321b8dab65679e7c615f6aa99af321b5e1171d46eacd5633
-
SHA512
01b4472e4e0cc44a862fdfe6c1ba8dedbb1ba0488a1165728f5ccad6f4a3ca3dd75808752b1e73a9db3c29d7ccb612b5be2c711f83dd4b6a3d07ce482c9fd462
Static task
static1
Behavioral task
behavioral1
Sample
trigger.ps1
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
trigger.ps1
Resource
win10v2004-20240704-en
Malware Config
Extracted
http://185.254.97.190:2024/test.txt
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip
Extracted
https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip
Targets
-
-
Target
trigger.ps1
-
Size
148B
-
MD5
5c83a346dccf035feb252605de22f437
-
SHA1
9fa30e0c65283ea3b1c3e9e738ff952baee54606
-
SHA256
783aa303eb647471321b8dab65679e7c615f6aa99af321b5e1171d46eacd5633
-
SHA512
01b4472e4e0cc44a862fdfe6c1ba8dedbb1ba0488a1165728f5ccad6f4a3ca3dd75808752b1e73a9db3c29d7ccb612b5be2c711f83dd4b6a3d07ce482c9fd462
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-