General
-
Target
1272235346f764cc597a0f6456c4b59a.bin
-
Size
45.2MB
-
Sample
241126-bc4gkssmfr
-
MD5
a0ba4efad1b206dda7b96e746db62327
-
SHA1
572f273b6b59e8cd9313a4a94c847c0a36655f43
-
SHA256
bebe54007e4e4f49da32435478a12f63915d99e47dc59033ccb32757f67aa2b0
-
SHA512
6ac0561231e7f03a82b3e10c67af9a129292da40c5210f56c0ff4afa79baae2f421e2117d1b649d437feac8626141557411332da632f0b3914641cd65218272c
-
SSDEEP
786432:GwDRw6n4/O3GomFFiLtDyjFTlD32Z+QhJWgMsc6MkEgWqzDvbHi52jtBuB:GjEdXmFAs5132ZDm16aPqTHRjKB
Static task
static1
Behavioral task
behavioral1
Sample
Exexcutor/dll/GameUI.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Exexcutor/dll/GameUI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Exexcutor/dll/RobloxPlayerBeta.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Exexcutor/dll/RobloxPlayerBeta.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Exexcutor/main.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Exexcutor/main.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Exexcutor/dll/GameUI.dll
-
Size
825KB
-
MD5
7050fafa87936d6a22b445b2252c2364
-
SHA1
eef08a9359dfc428b567d56528edfc2de6fb9120
-
SHA256
5359ffc4589711c625f88ba717391a05cfa91ce273e580a26e27298ad91f38ec
-
SHA512
50d962f491678bd900a33f889e751573a60aad70744b09fdb2de5a5433246589f45068c600e13529e99789a2e8d580d67bdde37e88db6fed78146b6582f157ae
-
SSDEEP
24576:jS6/WAXyjzg1UuakASe87AKoXtLmlBGh9:3fCkv89f
Score3/10 -
-
-
Target
Exexcutor/dll/RobloxPlayerBeta.dll
-
Size
30.3MB
-
MD5
37d24fd670952285ebfd71b67fd8c846
-
SHA1
4bdbcae296df1c68791bdd73c5624a8c67de9fb7
-
SHA256
c2473185b9a393b55bde12537d0164f3595f1940d8ed9ed612ea21f06fd7823b
-
SHA512
544e40228267f5e59a582d6df316a6e08e9e740cd5252ac70b53901dfd1e761ff9eca72cf03fd43f2cba86e94ec2a537823b6c5cc96ef8744a302141ee64a570
-
SSDEEP
98304:GXMt4v6+rCwLBcazmG52ZqIBnQeFJy6u93W635plyPv8UH12DEeTM46VF/Q29j4h:So+rFDmT1Q6un3a3H1s+FwGogbOqzOr
Score5/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Exexcutor/main.exe
-
Size
37.2MB
-
MD5
15753001204630c254b85fceadcb3027
-
SHA1
ea16917f1cf19b86f53b61e032a010c607a7ed05
-
SHA256
188a6bc8dd17cd7cda3b8ba3ce3ae9adb8d613f3dab9740e32c67c84ab3102b5
-
SHA512
7dd7a7ed06139933f79ff5e298fbfa9b63f19e4c7881f55dd208261f4bf5793a9bd58de66dec60b495c40955d61c9182472840358d80ab30f73ef1ab4989d75b
-
SSDEEP
786432:lzynVYtYYbKGk6ojijibkmr3x/Y25UQmxzgir:RYh6ouwPJX5URg
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3