Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 04:30
Behavioral task
behavioral1
Sample
2024-07-27_e58806e35c506abcae2b317571dbdbfc_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240704-en
windows7-x64
9 signatures
150 seconds
General
-
Target
2024-07-27_e58806e35c506abcae2b317571dbdbfc_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.0MB
-
MD5
e58806e35c506abcae2b317571dbdbfc
-
SHA1
8423cac50f4d5251efe2dd5155e5546778ae3035
-
SHA256
164a5e00a1403b2833e4d39fef1e78001aa5e8d6e6bf93f8c9dc67d0de179196
-
SHA512
611655751fe995aae12338a402e8e89c6cce402c207426c238f9181172f0aac3169d593c5c82e18e261e4997b5fb41853a7d478f403e976347bc5094f85d549a
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lU4:eOl56utgpPF8u/74
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4928-0-0x00007FF7F1D70000-0x00007FF7F20C4000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/4928-0-0x00007FF7F1D70000-0x00007FF7F20C4000-memory.dmp upx