General
-
Target
19-12-2024_UqVE2XPvW38Pgkj.zip
-
Size
4.3MB
-
Sample
241219-q73k4atnhx
-
MD5
cf356b163f946dc2f16d95febf45a583
-
SHA1
e7c8e964c23f86765d729b82d3140604bb00cb7c
-
SHA256
50d3bf20e1534889385de4b8d780a750c9d37a75c941ffae6dd961caef2eb325
-
SHA512
baa6367011ebda751fe7ef40a49f99e96c5daf19e068b02b2cdf564477f17a792a9dc0887b9723208d0c49d55a7e1c501723643d12fee8c8dcd0d1406e65be2d
-
SSDEEP
98304:YIv1mD5TqdFfK4iBOqWh3tWyfzbgwgGP7OZlGWwCR6t+uWiPBt1KP:YIdmFkF7iMtWKzkwgh1wc6t+cBS
Static task
static1
Behavioral task
behavioral1
Sample
19-12-2024_UqVE2XPvW38Pgkj.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19-12-2024_UqVE2XPvW38Pgkj.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Bootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Bootstrapper.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
19-12-2024_UqVE2XPvW38Pgkj.zip
-
Size
4.3MB
-
MD5
cf356b163f946dc2f16d95febf45a583
-
SHA1
e7c8e964c23f86765d729b82d3140604bb00cb7c
-
SHA256
50d3bf20e1534889385de4b8d780a750c9d37a75c941ffae6dd961caef2eb325
-
SHA512
baa6367011ebda751fe7ef40a49f99e96c5daf19e068b02b2cdf564477f17a792a9dc0887b9723208d0c49d55a7e1c501723643d12fee8c8dcd0d1406e65be2d
-
SSDEEP
98304:YIv1mD5TqdFfK4iBOqWh3tWyfzbgwgGP7OZlGWwCR6t+uWiPBt1KP:YIdmFkF7iMtWKzkwgh1wc6t+cBS
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Bootstrapper.exe
-
Size
5.1MB
-
MD5
d15c24a478c313ede9d4ad03a4164f8a
-
SHA1
aceaa3800a3c042243e39b1235b7c1eef338e90f
-
SHA256
87e35093021944aa354666c0f7b594f4414e2c29a2da69f62a427ed56f91d2b1
-
SHA512
2b373ab102ba01bbb119f2e08daac38cb3f90939be0474c6086eb2d6e64eead65b41b8a818f464248b67973539b5de879844fe4175268ae8db808230480fea40
-
SSDEEP
98304:0m4Qu+5piXB4eQXpj7hSMlQ49iHnM5o7cXFX8wE8PC9iNmoOqgULyQqgYVJEN:0m4QZzjVp8i9pkrIC92ngUL5q1E
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Defense Evasion
Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1