General
-
Target
06516ad9fcffe9f9a960872ce004c430N.exe
-
Size
3.2MB
-
Sample
240801-1ewbesxaqj
-
MD5
06516ad9fcffe9f9a960872ce004c430
-
SHA1
fe0ccc5f9abe502f5e400923736dbe1a894f209e
-
SHA256
6719fdbc85d2dfdcf5d9b974fa569005a4e2aaf2265b42ab229ee3ad5c2c044a
-
SHA512
19de159c930f9dd07adf8868c4ce1081934de0cad11eeba2046e24d633068641c4c9ebdf1836e6502a16d28243f8af7a462a5e28fec80177e8d08c2755436700
-
SSDEEP
98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWD:7bBeSFkX
Behavioral task
behavioral1
Sample
06516ad9fcffe9f9a960872ce004c430N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06516ad9fcffe9f9a960872ce004c430N.exe
Resource
win10v2004-20240730-en
Malware Config
Targets
-
-
Target
06516ad9fcffe9f9a960872ce004c430N.exe
-
Size
3.2MB
-
MD5
06516ad9fcffe9f9a960872ce004c430
-
SHA1
fe0ccc5f9abe502f5e400923736dbe1a894f209e
-
SHA256
6719fdbc85d2dfdcf5d9b974fa569005a4e2aaf2265b42ab229ee3ad5c2c044a
-
SHA512
19de159c930f9dd07adf8868c4ce1081934de0cad11eeba2046e24d633068641c4c9ebdf1836e6502a16d28243f8af7a462a5e28fec80177e8d08c2755436700
-
SSDEEP
98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWD:7bBeSFkX
Score10/10-
XMRig Miner payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-