General
-
Target
97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e
-
Size
2.5MB
-
Sample
240726-bcqwgswejq
-
MD5
3a8cf309ffd3c98786ac9e6b285fd921
-
SHA1
1d0da90f5c79780db52124f1d749170b1d6b927a
-
SHA256
97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e
-
SHA512
9bbed442ac0535f98f314f5f114b38d9c42d29a57a79110c28ee5eb80b099c46c0c6513f3b0f21f4a3f02b4f7674557912fb88aa8a901d3101af4feee77c878e
-
SSDEEP
49152:Ih2KUWaOYeSMZtmpABLrVGAv/LP5DqDcFaaOnKnLK7nb9bE:F1TOYGLmEVzBcqaaOnKnLK7n
Static task
static1
Behavioral task
behavioral1
Sample
97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e
-
Size
2.5MB
-
MD5
3a8cf309ffd3c98786ac9e6b285fd921
-
SHA1
1d0da90f5c79780db52124f1d749170b1d6b927a
-
SHA256
97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e
-
SHA512
9bbed442ac0535f98f314f5f114b38d9c42d29a57a79110c28ee5eb80b099c46c0c6513f3b0f21f4a3f02b4f7674557912fb88aa8a901d3101af4feee77c878e
-
SSDEEP
49152:Ih2KUWaOYeSMZtmpABLrVGAv/LP5DqDcFaaOnKnLK7nb9bE:F1TOYGLmEVzBcqaaOnKnLK7n
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-