General
-
Target
d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432.exe
-
Size
5.0MB
-
Sample
241009-cv42hatgpr
-
MD5
1a67a432e7ab0bcd2189f3f4142f2ae4
-
SHA1
168307b08e5c7a740d7dfcaa4be93e02f80e3fb9
-
SHA256
d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432
-
SHA512
f849ea7ba3bd6865935065d542247a9256c0ccc669f9f57639e44c374c4aa3b03ff4a33f956f6027cb5aa97069ec5b9eb943c1d57034cc7d9821f52f44ffde9b
-
SSDEEP
98304:yGp6tj9L5rremSnrC7ag91f3dOuyUPpSJawwSDJiRRiy5CevO+OGLUA:J6N96ut9xwUPpSDwMiRsKhhpX
Static task
static1
Behavioral task
behavioral1
Sample
d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432.exe
-
Size
5.0MB
-
MD5
1a67a432e7ab0bcd2189f3f4142f2ae4
-
SHA1
168307b08e5c7a740d7dfcaa4be93e02f80e3fb9
-
SHA256
d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432
-
SHA512
f849ea7ba3bd6865935065d542247a9256c0ccc669f9f57639e44c374c4aa3b03ff4a33f956f6027cb5aa97069ec5b9eb943c1d57034cc7d9821f52f44ffde9b
-
SSDEEP
98304:yGp6tj9L5rremSnrC7ag91f3dOuyUPpSJawwSDJiRRiy5CevO+OGLUA:J6N96ut9xwUPpSDwMiRsKhhpX
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-