General
-
Target
Melonity.7z
-
Size
75.8MB
-
Sample
241120-p16hqsxelm
-
MD5
19d13cc25d3df6877e1cff173f4f7e19
-
SHA1
0c8fc7c0135f08587d16d3e525466d02181b3603
-
SHA256
3cfc46b4322ca60c012b069e781d8dab86d778e508441848b442d873a47a450d
-
SHA512
31790f097a351bd2c3097207bf1378c7b08f0cf8da2e6227e915e2f40f7a6755f441c7a89eb630a029641b1786917afb3fd8ae48456b3f32603ece7c2c35d5e6
-
SSDEEP
1572864:K+pi9HqhhRBVIsh7ckOwTbFZlROpHou2U1bSOWpQQYcEiTS4o:ri65BLTbFZlROFo32gQQYTia
Static task
static1
Behavioral task
behavioral1
Sample
Melonity.7z
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
Melonity.7z
-
Size
75.8MB
-
MD5
19d13cc25d3df6877e1cff173f4f7e19
-
SHA1
0c8fc7c0135f08587d16d3e525466d02181b3603
-
SHA256
3cfc46b4322ca60c012b069e781d8dab86d778e508441848b442d873a47a450d
-
SHA512
31790f097a351bd2c3097207bf1378c7b08f0cf8da2e6227e915e2f40f7a6755f441c7a89eb630a029641b1786917afb3fd8ae48456b3f32603ece7c2c35d5e6
-
SSDEEP
1572864:K+pi9HqhhRBVIsh7ckOwTbFZlROpHou2U1bSOWpQQYcEiTS4o:ri65BLTbFZlROFo32gQQYTia
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-