General
-
Target
c2b08a49b4c74717421d0abeb7ef16ca9f4af9c838fb8bf5766e237bec0e9ad3N
-
Size
5.5MB
-
Sample
240928-asemqazdlf
-
MD5
e7d304729ee2a88ff113745d3c03f280
-
SHA1
1f7679880a97244514ea2f1064d30581cb8eb648
-
SHA256
c2b08a49b4c74717421d0abeb7ef16ca9f4af9c838fb8bf5766e237bec0e9ad3
-
SHA512
57fbd2313cf7a872835164045db4eb774f37d0635988b5fc937cfcd61cdd70410066373386d0037c6d6add74a1c5c5f6c588f3f781c53c6ce1b5dda6c0fc3e88
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
Static task
static1
Behavioral task
behavioral1
Sample
c2b08a49b4c74717421d0abeb7ef16ca9f4af9c838fb8bf5766e237bec0e9ad3N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c2b08a49b4c74717421d0abeb7ef16ca9f4af9c838fb8bf5766e237bec0e9ad3N
-
Size
5.5MB
-
MD5
e7d304729ee2a88ff113745d3c03f280
-
SHA1
1f7679880a97244514ea2f1064d30581cb8eb648
-
SHA256
c2b08a49b4c74717421d0abeb7ef16ca9f4af9c838fb8bf5766e237bec0e9ad3
-
SHA512
57fbd2313cf7a872835164045db4eb774f37d0635988b5fc937cfcd61cdd70410066373386d0037c6d6add74a1c5c5f6c588f3f781c53c6ce1b5dda6c0fc3e88
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-