General
-
Target
1b62f76fe4b8c714af2ae108c56acc447a0507ba58f9b3e645a495b4945a41e2.ps1
-
Size
881B
-
Sample
241218-cm5m3ayjd1
-
MD5
08a5af8712cc8e8739f368de6a0b0bb1
-
SHA1
fc53d0660f16058f69938aad64363d886c64604e
-
SHA256
1b62f76fe4b8c714af2ae108c56acc447a0507ba58f9b3e645a495b4945a41e2
-
SHA512
5d78167de34a83c89d2ff1a2d59f737d27188a41f0dfa39d292d4aa28c1a25b58cbf64743c837495f191025f8999ff20c8a5313ca50f529f741c74d2cb8186d1
Static task
static1
Behavioral task
behavioral1
Sample
1b62f76fe4b8c714af2ae108c56acc447a0507ba58f9b3e645a495b4945a41e2.ps1
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
1b62f76fe4b8c714af2ae108c56acc447a0507ba58f9b3e645a495b4945a41e2.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
http://194.38.23.2
Targets
-
-
Target
1b62f76fe4b8c714af2ae108c56acc447a0507ba58f9b3e645a495b4945a41e2.ps1
-
Size
881B
-
MD5
08a5af8712cc8e8739f368de6a0b0bb1
-
SHA1
fc53d0660f16058f69938aad64363d886c64604e
-
SHA256
1b62f76fe4b8c714af2ae108c56acc447a0507ba58f9b3e645a495b4945a41e2
-
SHA512
5d78167de34a83c89d2ff1a2d59f737d27188a41f0dfa39d292d4aa28c1a25b58cbf64743c837495f191025f8999ff20c8a5313ca50f529f741c74d2cb8186d1
-
XMRig Miner payload
-
Xmrig family
-
Contacts a large (41076) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Blocklisted process makes network request
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
2