General
-
Target
ItroublveTSC.exe
-
Size
2.4MB
-
Sample
241220-csd3aswqgs
-
MD5
b5915bb34f01bad573a6cc0c314b9b8b
-
SHA1
8b10c4cbdf11fc016d9a48c79afd3ac05a13939d
-
SHA256
51353852176f069b6ab794f567a7cc2064341c8b80d9dd4ba0cfd8ca9948ae35
-
SHA512
6559d86bd6970a07c31c4fa330f41a50136b6d0abfa14e3782f5eaff1cbdfc9a1f39b3f1af4d2c0d181a7c83b73145a68ac54452ac21fe8f9584c47d9ac173c1
-
SSDEEP
49152:TAbfHjnTDRqfevVL3DfQ3QUzbzO9ayYaPSPFcKKiNixScEU4a3/B3D:TiPAfevVL3bQRO8Ea9csExN/r53D
Static task
static1
Behavioral task
behavioral1
Sample
ItroublveTSC.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ItroublveTSC.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ItroublveTSC.exe
-
Size
2.4MB
-
MD5
b5915bb34f01bad573a6cc0c314b9b8b
-
SHA1
8b10c4cbdf11fc016d9a48c79afd3ac05a13939d
-
SHA256
51353852176f069b6ab794f567a7cc2064341c8b80d9dd4ba0cfd8ca9948ae35
-
SHA512
6559d86bd6970a07c31c4fa330f41a50136b6d0abfa14e3782f5eaff1cbdfc9a1f39b3f1af4d2c0d181a7c83b73145a68ac54452ac21fe8f9584c47d9ac173c1
-
SSDEEP
49152:TAbfHjnTDRqfevVL3DfQ3QUzbzO9ayYaPSPFcKKiNixScEU4a3/B3D:TiPAfevVL3bQRO8Ea9csExN/r53D
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-