General
-
Target
cf60aeba851cfa8ab15ab52819dcb53dce733f4d56abc71c1a2297b336e7bf09N.exe
-
Size
5.6MB
-
Sample
241218-cbazbaxmfs
-
MD5
777a829be0809d1b5168545ca3013f20
-
SHA1
89053d9dc2fb41ba5394e7798a391c4b7f4efc8d
-
SHA256
cf60aeba851cfa8ab15ab52819dcb53dce733f4d56abc71c1a2297b336e7bf09
-
SHA512
c92f7704260b2fecf82d92b67ff1d4f24d2de23c60783393c5ff929d0997b221778bdbd5a2d62ee7c48b59f9f42519853bc8910a7f14887b849cccd1118451fc
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
Static task
static1
Behavioral task
behavioral1
Sample
cf60aeba851cfa8ab15ab52819dcb53dce733f4d56abc71c1a2297b336e7bf09N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
cf60aeba851cfa8ab15ab52819dcb53dce733f4d56abc71c1a2297b336e7bf09N.exe
-
Size
5.6MB
-
MD5
777a829be0809d1b5168545ca3013f20
-
SHA1
89053d9dc2fb41ba5394e7798a391c4b7f4efc8d
-
SHA256
cf60aeba851cfa8ab15ab52819dcb53dce733f4d56abc71c1a2297b336e7bf09
-
SHA512
c92f7704260b2fecf82d92b67ff1d4f24d2de23c60783393c5ff929d0997b221778bdbd5a2d62ee7c48b59f9f42519853bc8910a7f14887b849cccd1118451fc
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-