General
-
Target
7FAR - ZModeler 3.1.4 (build 1142).rar
-
Size
19.7MB
-
Sample
241219-wnl2wsxjhv
-
MD5
305574e146362152fdc3d3d5a86bd291
-
SHA1
26154d5487a726f92ab2a9ea0bc4f8f88c659f16
-
SHA256
7be84af94664fd42c740a31a89a82a51ede33cd3ce18bd42500d7d5345a0488d
-
SHA512
0987a9ee9dfcfd10ccac940b020940c1b67f74d284a4e13169a5ba35b2dff2b58e8940ce0e8f0132b08873c3fc733fd1ee683cf510817c1b224409cec4de3377
-
SSDEEP
393216:UQL36RFAdrEl6/laKIn0jWCmOwgot1jjYRpQM4hqSQCjDnC:U5addla1n0ieDovC20m2
Static task
static1
Malware Config
Targets
-
-
Target
7FAR - ZModeler 3.1.4 (build 1142).rar
-
Size
19.7MB
-
MD5
305574e146362152fdc3d3d5a86bd291
-
SHA1
26154d5487a726f92ab2a9ea0bc4f8f88c659f16
-
SHA256
7be84af94664fd42c740a31a89a82a51ede33cd3ce18bd42500d7d5345a0488d
-
SHA512
0987a9ee9dfcfd10ccac940b020940c1b67f74d284a4e13169a5ba35b2dff2b58e8940ce0e8f0132b08873c3fc733fd1ee683cf510817c1b224409cec4de3377
-
SSDEEP
393216:UQL36RFAdrEl6/laKIn0jWCmOwgot1jjYRpQM4hqSQCjDnC:U5addla1n0ieDovC20m2
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-