General
-
Target
0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f.exe
-
Size
2.1MB
-
Sample
241120-2b258svgrq
-
MD5
ebb42b2a3a147e19b72b77a3977600c9
-
SHA1
8e4e8e2384a226ff0840b34610c8ca2ffa4c9240
-
SHA256
0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f
-
SHA512
0b54d7ffaff3e44999fde5c74e3a9d3d30370cf1fc9c99268321c815a76c47ed2b906e131e43f8fe1443e1167372bd68ee2f52d5337ff16da858f380d42ddb9b
-
SSDEEP
49152:KLn083VH2ecNONSbowqPObPca9WO7oB34W0OIFXhE9+oAnTAXUbI:QLy5PLLoB34WNIfE9rWs0I
Static task
static1
Behavioral task
behavioral1
Sample
0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f.exe
-
Size
2.1MB
-
MD5
ebb42b2a3a147e19b72b77a3977600c9
-
SHA1
8e4e8e2384a226ff0840b34610c8ca2ffa4c9240
-
SHA256
0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f
-
SHA512
0b54d7ffaff3e44999fde5c74e3a9d3d30370cf1fc9c99268321c815a76c47ed2b906e131e43f8fe1443e1167372bd68ee2f52d5337ff16da858f380d42ddb9b
-
SSDEEP
49152:KLn083VH2ecNONSbowqPObPca9WO7oB34W0OIFXhE9+oAnTAXUbI:QLy5PLLoB34WNIfE9rWs0I
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-