General
-
Target
ICBM.7z
-
Size
767KB
-
Sample
241031-3djmcasqbz
-
MD5
93e7f7080797b83f022783663051cac6
-
SHA1
dd0944cdf23b767f40a633319b58f15c5e07e9a7
-
SHA256
3d975853527f3c27c107f2ffc2371203b062280690cc0e8ead2368128b1a2d1f
-
SHA512
549f288d3353dfae80257b3dce54af48c02e947bfe3974771d9711032c60224103cbeba9a2f8bd70a20d1e37742dd8b4b8a72ed63eb4f07a5fe241231aafb309
-
SSDEEP
12288:uo0PgpFx+PqCLU9vVzgfTIu7DUKs3NfqmrIoE82W3f/YdAwJi9btEL05iwoMuVzk:JugpFwUfzSHUKs3Ny49ttC05dFaAHiCp
Static task
static1
Behavioral task
behavioral1
Sample
ICBM.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
ICBM.exe
-
Size
2.5MB
-
MD5
7f4ab17c8ad7b40f534a04df2ccb173a
-
SHA1
632fea5cdd848ed91429fe23eee710c0e8da1eea
-
SHA256
a9665eff0a88b9ac3c3ca0a53cbb8ba8624644ee1a1d8ae60fa3d9925b961780
-
SHA512
7ac032df41360ba46dcb80a64a6546b815a5dc3295aa66eaf834e40402b44bfed53a6562b21c2ead4cf6b30553730941c73df093fa6077b3589876c13b724548
-
SSDEEP
49152:YiBToTd1klhXkIyKg6LQiuD2fDLeqt3yhkWwwxS9p/iLwdQIZL:K1QdW6f6xIi9IZL
-
XMRig Miner payload
-
Xmrig family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Download via BitsAdmin
-
Executes dropped EXE
-
Drops file in System32 directory
-