General
-
Target
ad490bb460209b6a9183f7a5e7093c27f5b09cd26f2ab59d34b290d4f8bd69e9
-
Size
2.5MB
-
Sample
241116-yga26asfjm
-
MD5
5c55da00932dc856a0ea2300548d7ba8
-
SHA1
0086bd795859a806345162e058b2bf76289ab3d8
-
SHA256
ad490bb460209b6a9183f7a5e7093c27f5b09cd26f2ab59d34b290d4f8bd69e9
-
SHA512
19bfff4ac9c278987988ff099f3cfcc58d53a211e1c7c975ca5070bc43c363c361c3b0e6c70c26b75133a84447da4a151af7506c563d9a2a2be6c9d92437d3d9
-
SSDEEP
49152:wnErrvH3Ycpk8lLnGxF2rwUCYvQc+0MiXQ6Ou005AYulpIe:0EnH39k0ekrhZvQH0RAD2Axjn
Static task
static1
Behavioral task
behavioral1
Sample
ad490bb460209b6a9183f7a5e7093c27f5b09cd26f2ab59d34b290d4f8bd69e9.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ad490bb460209b6a9183f7a5e7093c27f5b09cd26f2ab59d34b290d4f8bd69e9
-
Size
2.5MB
-
MD5
5c55da00932dc856a0ea2300548d7ba8
-
SHA1
0086bd795859a806345162e058b2bf76289ab3d8
-
SHA256
ad490bb460209b6a9183f7a5e7093c27f5b09cd26f2ab59d34b290d4f8bd69e9
-
SHA512
19bfff4ac9c278987988ff099f3cfcc58d53a211e1c7c975ca5070bc43c363c361c3b0e6c70c26b75133a84447da4a151af7506c563d9a2a2be6c9d92437d3d9
-
SSDEEP
49152:wnErrvH3Ycpk8lLnGxF2rwUCYvQc+0MiXQ6Ou005AYulpIe:0EnH39k0ekrhZvQH0RAD2Axjn
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-