General
-
Target
1ed64b6b227819cf85ae9a739b566ee9120014675ef414876e56d68ce9c18b0b.exe
-
Size
2.6MB
-
Sample
240911-gybataxbra
-
MD5
2744f4e925cf07ad3e1efe749336139c
-
SHA1
2a066eb3f8221f6e4f52e5b8c901650a460755cf
-
SHA256
1ed64b6b227819cf85ae9a739b566ee9120014675ef414876e56d68ce9c18b0b
-
SHA512
fc179c3cd961ee1ec3db0bbf68710b8c1a624f3c2c6cad40c7f8a9d7e065046a2f58a3a3cedddc7d9541a51110bb76072ad9bc830319671f3153790c25e12dcf
-
SSDEEP
49152:S5C1PCzSELNCV/J0jOfMC0O8d2cE5WyiYyEGZ+GtjJhU:SoTELS/aSfMC0h65WuW7/U
Static task
static1
Behavioral task
behavioral1
Sample
1ed64b6b227819cf85ae9a739b566ee9120014675ef414876e56d68ce9c18b0b.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
1ed64b6b227819cf85ae9a739b566ee9120014675ef414876e56d68ce9c18b0b.exe
-
Size
2.6MB
-
MD5
2744f4e925cf07ad3e1efe749336139c
-
SHA1
2a066eb3f8221f6e4f52e5b8c901650a460755cf
-
SHA256
1ed64b6b227819cf85ae9a739b566ee9120014675ef414876e56d68ce9c18b0b
-
SHA512
fc179c3cd961ee1ec3db0bbf68710b8c1a624f3c2c6cad40c7f8a9d7e065046a2f58a3a3cedddc7d9541a51110bb76072ad9bc830319671f3153790c25e12dcf
-
SSDEEP
49152:S5C1PCzSELNCV/J0jOfMC0O8d2cE5WyiYyEGZ+GtjJhU:SoTELS/aSfMC0h65WuW7/U
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-