General
-
Target
acdfownevzxz.exe
-
Size
2.6MB
-
Sample
240913-2sre3atbnr
-
MD5
4bce7738ec0f0b1610a09597da99aa4b
-
SHA1
6dc841342371ed2428f6c9c895271add85c5d9f8
-
SHA256
ef6281ca217238d429b2298cba9123c6d15e62fcdc16ddd8e5e4b58c31314e04
-
SHA512
a11e1f7b1ffced240ef81d0da18a2860bd550754c525d559fe3256cab314b78119f7c08510299536c47c14d06708d3bff77050e0eb1106af8abca0423b8d1626
-
SSDEEP
49152:QsxozhYQnNR8vmZma3gN/ALwZCHaS4Xw9xCE2fpa3co:Q3a+RafjNKwAHNR3
Static task
static1
Malware Config
Targets
-
-
Target
acdfownevzxz.exe
-
Size
2.6MB
-
MD5
4bce7738ec0f0b1610a09597da99aa4b
-
SHA1
6dc841342371ed2428f6c9c895271add85c5d9f8
-
SHA256
ef6281ca217238d429b2298cba9123c6d15e62fcdc16ddd8e5e4b58c31314e04
-
SHA512
a11e1f7b1ffced240ef81d0da18a2860bd550754c525d559fe3256cab314b78119f7c08510299536c47c14d06708d3bff77050e0eb1106af8abca0423b8d1626
-
SSDEEP
49152:QsxozhYQnNR8vmZma3gN/ALwZCHaS4Xw9xCE2fpa3co:Q3a+RafjNKwAHNR3
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-