General
-
Target
2904aac2441de9b0775ec50dc2f5240f708dfaf8726101915c0676822ded2044N
-
Size
2.6MB
-
Sample
240919-j12lwsyglm
-
MD5
84717b1acb938094d8ec2f3f2d84bae0
-
SHA1
5fa07ba97b2b368053da68113f378d1f2b4ae47c
-
SHA256
2904aac2441de9b0775ec50dc2f5240f708dfaf8726101915c0676822ded2044
-
SHA512
0de4083cf7504f9ccb62a348d4e2a57e071f887990bb2b5e151d23c2d2f45a53b97ce85be43fd93496ddc1d87dffdced9886f74ab30b35eae4ee19ad7efcc636
-
SSDEEP
49152:Jh9g5pJ53+XO6cbSF1AWaBfzQi36he/FOM07kjnLzN0Tf:JHg5pJB++NbSkWaUI/FyYjnt0Tf
Static task
static1
Behavioral task
behavioral1
Sample
2904aac2441de9b0775ec50dc2f5240f708dfaf8726101915c0676822ded2044N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2904aac2441de9b0775ec50dc2f5240f708dfaf8726101915c0676822ded2044N
-
Size
2.6MB
-
MD5
84717b1acb938094d8ec2f3f2d84bae0
-
SHA1
5fa07ba97b2b368053da68113f378d1f2b4ae47c
-
SHA256
2904aac2441de9b0775ec50dc2f5240f708dfaf8726101915c0676822ded2044
-
SHA512
0de4083cf7504f9ccb62a348d4e2a57e071f887990bb2b5e151d23c2d2f45a53b97ce85be43fd93496ddc1d87dffdced9886f74ab30b35eae4ee19ad7efcc636
-
SSDEEP
49152:Jh9g5pJ53+XO6cbSF1AWaBfzQi36he/FOM07kjnLzN0Tf:JHg5pJB++NbSkWaUI/FyYjnt0Tf
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-