Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 10:17
Behavioral task
behavioral1
Sample
2024-09-15_f23d09b4dbde03580f51bf6cdbd5625f_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
General
-
Target
2024-09-15_f23d09b4dbde03580f51bf6cdbd5625f_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.1MB
-
MD5
f23d09b4dbde03580f51bf6cdbd5625f
-
SHA1
e186ff83a02f6af0afeb60ec35b44adc5559e2c7
-
SHA256
b7418b0b2470f254305f672ec116ec4a14e899a513ac3e5c1e6fa160b1e9459d
-
SHA512
7c64afefb7de7343604751aa3e7eefa85848bc45be4947e141a5e97d388ff4f53c9616f4defc9cc06e8e263739cea3ec97ecde69b2636e08769d1da87f00aa35
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lUC:eOl56utgpPF8u/7C
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/2248-0-0x00007FF6E8880000-0x00007FF6E8BD4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/2248-0-0x00007FF6E8880000-0x00007FF6E8BD4000-memory.dmp upx