General
-
Target
44c0051565452b0923a8225586052650N.exe
-
Size
1.9MB
-
Sample
240707-f6kc1sxcnc
-
MD5
44c0051565452b0923a8225586052650
-
SHA1
0f011046bba7713aba42b0e68cad19bfd0488c91
-
SHA256
4bba3602dddba48db81b06cbe5f4c1c1cec1b97afea9bc0cec72fc6073bdd281
-
SHA512
aa3396768d7e23ea90e3d875178d702b27afb0af89e0ca412a5475dd80b2601e36e6d04f9c118db82ed8941311c5d58f3dda4cd2a5b242bc354e69dee3ca472e
-
SSDEEP
49152:Lz071uv4BPMkyW10/w16BvZXBCurmhS+T:NAB9
Behavioral task
behavioral1
Sample
44c0051565452b0923a8225586052650N.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
44c0051565452b0923a8225586052650N.exe
-
Size
1.9MB
-
MD5
44c0051565452b0923a8225586052650
-
SHA1
0f011046bba7713aba42b0e68cad19bfd0488c91
-
SHA256
4bba3602dddba48db81b06cbe5f4c1c1cec1b97afea9bc0cec72fc6073bdd281
-
SHA512
aa3396768d7e23ea90e3d875178d702b27afb0af89e0ca412a5475dd80b2601e36e6d04f9c118db82ed8941311c5d58f3dda4cd2a5b242bc354e69dee3ca472e
-
SSDEEP
49152:Lz071uv4BPMkyW10/w16BvZXBCurmhS+T:NAB9
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-