General
-
Target
69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36.exe
-
Size
2.5MB
-
Sample
241115-tv2d2s1lel
-
MD5
1e98c4b685df4156ed75fcc0a6b93ba9
-
SHA1
0ca672621f2bcd3649955ed748142f698f596601
-
SHA256
69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36
-
SHA512
7d36170f464787373f0d9aa4af4c1949962bc21722fdf38ed934bff5b236fe17e4717f951f735b9df8e766ccf7c1f653591eb607613e016bdb05198130048871
-
SSDEEP
49152:4FUPj9hHjc2Hil9gJaEgCR37gGVMISw6RtmGNIOLD1ciNKWI2O6xYWb3Kuz/+nr:77vHM9gJaFCRPS3f7LrrOaYY6u8r
Static task
static1
Behavioral task
behavioral1
Sample
69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36.exe
-
Size
2.5MB
-
MD5
1e98c4b685df4156ed75fcc0a6b93ba9
-
SHA1
0ca672621f2bcd3649955ed748142f698f596601
-
SHA256
69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36
-
SHA512
7d36170f464787373f0d9aa4af4c1949962bc21722fdf38ed934bff5b236fe17e4717f951f735b9df8e766ccf7c1f653591eb607613e016bdb05198130048871
-
SSDEEP
49152:4FUPj9hHjc2Hil9gJaEgCR37gGVMISw6RtmGNIOLD1ciNKWI2O6xYWb3Kuz/+nr:77vHM9gJaFCRPS3f7LrrOaYY6u8r
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-