General
-
Target
sigmasoft-addon2.exe
-
Size
5.0MB
-
Sample
241110-r9xcjaykfw
-
MD5
8cd64540e579ed3add4ee8f77615367d
-
SHA1
1581bc9c7f6fe0539fd9f4719eb0041c9433205f
-
SHA256
eb6e35374536bf45bdbd5795cb14752751632e77dbe1e126d8c3daf66a4ae894
-
SHA512
5b62686686323ea3f0615870628e715ba3b1206f3d1922c5a2740bc17492abbdd4415847be5bf47b263582ffb93898ae9be9cfc7a18729dc548cb429676e9675
-
SSDEEP
98304:kD2jj++AgJnuo/dJp4k48AOT6xx9DZ5pFko6wDLgA0e7Tav9xB6YkrjI:kajj++TJn3dDuzxzco6iv0efafeX
Static task
static1
Malware Config
Targets
-
-
Target
sigmasoft-addon2.exe
-
Size
5.0MB
-
MD5
8cd64540e579ed3add4ee8f77615367d
-
SHA1
1581bc9c7f6fe0539fd9f4719eb0041c9433205f
-
SHA256
eb6e35374536bf45bdbd5795cb14752751632e77dbe1e126d8c3daf66a4ae894
-
SHA512
5b62686686323ea3f0615870628e715ba3b1206f3d1922c5a2740bc17492abbdd4415847be5bf47b263582ffb93898ae9be9cfc7a18729dc548cb429676e9675
-
SSDEEP
98304:kD2jj++AgJnuo/dJp4k48AOT6xx9DZ5pFko6wDLgA0e7Tav9xB6YkrjI:kajj++TJn3dDuzxzco6iv0efafeX
-
Xmrig family
-
XMRig Miner payload
-
Creates new service(s)
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Suspicious use of SetThreadContext
-