Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 01:09
Behavioral task
behavioral1
Sample
2024-11-19_77e325ddb98b9ddfce86ba17b2d86fc4_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
11 signatures
150 seconds
General
-
Target
2024-11-19_77e325ddb98b9ddfce86ba17b2d86fc4_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.0MB
-
MD5
77e325ddb98b9ddfce86ba17b2d86fc4
-
SHA1
d0bf864288caabd6cca47fe21e16729d65bb4c88
-
SHA256
1aa178ad23e7b9cb064c345eb8f3ac21e6bbba417812d90abb8809657c6348c7
-
SHA512
d41b350f917671311005de2ad410f553ad3a4874821c28c021057869c687174c808d3b9d5902b71d7b99f7523dbbc724c9f6654e52a9d1b96935e4bd48e6253b
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lUD:eOl56utgpPF8u/7D
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/1136-0-0x00007FF6AF1B0000-0x00007FF6AF504000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1136-0-0x00007FF6AF1B0000-0x00007FF6AF504000-memory.dmp upx