General
-
Target
228c09c31156d45dfe94195bb34d1399.exe
-
Size
14.0MB
-
Sample
241220-sf66baxqhz
-
MD5
228c09c31156d45dfe94195bb34d1399
-
SHA1
20c6ce4757be1399032b2ac6873dc505c1d02839
-
SHA256
b76ecfa778793bdf379a63b55d60b4b3941e10b743e48ae3b414b3522212abdb
-
SHA512
003557ad24f826143a50cce81b56489c7768951ecdfef9b01fe645f5453ae8cf36bd1b2b6e5e3bd8d27131cf3a2d54d20b7c699ae582e2528b65aee8a560f40c
-
SSDEEP
393216:hPsdXtBcda7nzo7Vd7Qv1CPwDvt3uFRCyGTQP76NuudqfZnXSdEVB3:hITk1
Static task
static1
Behavioral task
behavioral1
Sample
228c09c31156d45dfe94195bb34d1399.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
228c09c31156d45dfe94195bb34d1399.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
228c09c31156d45dfe94195bb34d1399.exe
-
Size
14.0MB
-
MD5
228c09c31156d45dfe94195bb34d1399
-
SHA1
20c6ce4757be1399032b2ac6873dc505c1d02839
-
SHA256
b76ecfa778793bdf379a63b55d60b4b3941e10b743e48ae3b414b3522212abdb
-
SHA512
003557ad24f826143a50cce81b56489c7768951ecdfef9b01fe645f5453ae8cf36bd1b2b6e5e3bd8d27131cf3a2d54d20b7c699ae582e2528b65aee8a560f40c
-
SSDEEP
393216:hPsdXtBcda7nzo7Vd7Qv1CPwDvt3uFRCyGTQP76NuudqfZnXSdEVB3:hITk1
Score10/10-
XMRig Miner payload
-
Xmrig family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Server Software Component: Terminal Services DLL
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1