General
-
Target
Cursed Predictor.exe
-
Size
2.2MB
-
Sample
241117-11fg4azamd
-
MD5
4bac19442ed88bfcdca107b18824bfd4
-
SHA1
880fb3e65ae6eb75a7c868da907ae9f6dc7a844b
-
SHA256
bb84703780bd730fe535d2c07382c46b15be3ecd61cc0480bba49390fbe8ac8a
-
SHA512
7f242b259aff40ceac205d2bd9bb8ab05c4d381e432684b9f04dffa2b39e43fb928fa114ab1ab0b431654119694afa60261b50e28ad843e6662bb0ea2c64fd9a
-
SSDEEP
49152:dArx5TeQSNLnz2qOkubr6iAeDP1MU1ya4ErLo:qVEQSNXOjAeiU1yDErM
Static task
static1
Malware Config
Targets
-
-
Target
Cursed Predictor.exe
-
Size
2.2MB
-
MD5
4bac19442ed88bfcdca107b18824bfd4
-
SHA1
880fb3e65ae6eb75a7c868da907ae9f6dc7a844b
-
SHA256
bb84703780bd730fe535d2c07382c46b15be3ecd61cc0480bba49390fbe8ac8a
-
SHA512
7f242b259aff40ceac205d2bd9bb8ab05c4d381e432684b9f04dffa2b39e43fb928fa114ab1ab0b431654119694afa60261b50e28ad843e6662bb0ea2c64fd9a
-
SSDEEP
49152:dArx5TeQSNLnz2qOkubr6iAeDP1MU1ya4ErLo:qVEQSNXOjAeiU1yDErM
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-