Behavioral task
behavioral1
Sample
428b363798ef2f788d8fd9c1a819e24ab1cbaf3bc6d7b1eda7e88062ff2dd4e5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
428b363798ef2f788d8fd9c1a819e24ab1cbaf3bc6d7b1eda7e88062ff2dd4e5.exe
Resource
win10v2004-20240802-en
General
-
Target
428b363798ef2f788d8fd9c1a819e24ab1cbaf3bc6d7b1eda7e88062ff2dd4e5
-
Size
2.9MB
-
MD5
5c1467a0a728da1ffc22ef7c34b4e74b
-
SHA1
54fecbdcc62ed42fe9558dc8c8f463f322f1f6fd
-
SHA256
428b363798ef2f788d8fd9c1a819e24ab1cbaf3bc6d7b1eda7e88062ff2dd4e5
-
SHA512
46cce52f0f21dd39bb5aa279e221951b1a94426f0f33caf839e00f73f11722767a82186873255deecc444c603f23dcf692ac0395b3ce2b7a7ef991345e9d672d
-
SSDEEP
49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkyW10/w16BWgacM:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RI
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule sample xmrig -
Xmrig family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 428b363798ef2f788d8fd9c1a819e24ab1cbaf3bc6d7b1eda7e88062ff2dd4e5
Files
-
428b363798ef2f788d8fd9c1a819e24ab1cbaf3bc6d7b1eda7e88062ff2dd4e5.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 1.3MB - Virtual size: 3.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 525KB - Virtual size: 528KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE