General
-
Target
73ee6137310fdae90df53e3eadfb50a0N.exe
-
Size
5.4MB
-
Sample
240814-fmapgasajm
-
MD5
73ee6137310fdae90df53e3eadfb50a0
-
SHA1
ca9a8fd71385663f7022e03859bb8f768e34cc9f
-
SHA256
8cf6a01110f4da578fde808d76bc586e6ceb1940fb5b16a953a0bd36fdc02261
-
SHA512
d227efdc1c6ab6a02e441f4e0ad92615c405d0650f7ed3b95b10f6968373f7e783ad0aed277302c201096e6fb1fb9fde2f8ebba445b07de33fbc574c6e64fb21
-
SSDEEP
98304:xRjPz9KDzUU8O5/B/LJ25E9SVh86sS3TRknQ3ss2MApp9meypA3cPDu7:xFKoU8O5/b2XViSjX310SeyGc7u7
Static task
static1
Behavioral task
behavioral1
Sample
73ee6137310fdae90df53e3eadfb50a0N.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
73ee6137310fdae90df53e3eadfb50a0N.exe
-
Size
5.4MB
-
MD5
73ee6137310fdae90df53e3eadfb50a0
-
SHA1
ca9a8fd71385663f7022e03859bb8f768e34cc9f
-
SHA256
8cf6a01110f4da578fde808d76bc586e6ceb1940fb5b16a953a0bd36fdc02261
-
SHA512
d227efdc1c6ab6a02e441f4e0ad92615c405d0650f7ed3b95b10f6968373f7e783ad0aed277302c201096e6fb1fb9fde2f8ebba445b07de33fbc574c6e64fb21
-
SSDEEP
98304:xRjPz9KDzUU8O5/B/LJ25E9SVh86sS3TRknQ3ss2MApp9meypA3cPDu7:xFKoU8O5/b2XViSjX310SeyGc7u7
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-