Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 16:56
Behavioral task
behavioral1
Sample
2024-12-07_eaf2f6e2f5d8a79cf769413601bfcd40_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240729-en
11 signatures
150 seconds
General
-
Target
2024-12-07_eaf2f6e2f5d8a79cf769413601bfcd40_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.1MB
-
MD5
eaf2f6e2f5d8a79cf769413601bfcd40
-
SHA1
af69171db318080bf93f799afafafa5256932eca
-
SHA256
fc82038cc44d8d737528780a7512701d471880db543fa196f24381a006f051a9
-
SHA512
96d0f2f8c97ff309f3b492638552947ddeb937a67b7cfc7571ca07318cf064be2f3e81fc33f89e2a0c202b9719bed970367901f47439b5ccac5283cec78bf0b9
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lU9:eOl56utgpPF8u/79
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/4764-0-0x00007FF6A1780000-0x00007FF6A1AD4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/4764-0-0x00007FF6A1780000-0x00007FF6A1AD4000-memory.dmp upx