Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 17:50
Behavioral task
behavioral1
Sample
a3c4d717c859fad550664f450047342603989df355e1414c70dcb8b4dd346f7c.exe
Resource
win7-20241010-en
windows7-x64
9 signatures
150 seconds
General
-
Target
a3c4d717c859fad550664f450047342603989df355e1414c70dcb8b4dd346f7c.exe
-
Size
1.5MB
-
MD5
2dc00c2319b848ff61f600a6d3f544a2
-
SHA1
8e0c9491cdd01d32237e0d672f6d9a629488be11
-
SHA256
a3c4d717c859fad550664f450047342603989df355e1414c70dcb8b4dd346f7c
-
SHA512
a2202036ae58967d064ce65f916a6ab123734a592fc532138348076b0f158160f7008a9a0ea26c75d5d122c580455d474389b84a07f9a718cf8e117b3bad1a05
-
SSDEEP
49152:EnCbL83y9FdfE0pZ0zCa4wI156uL3pgrCEm:EniLf9FdfE0pZB156utga
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/3888-0-0x00007FF7F5370000-0x00007FF7F56C4000-memory.dmp xmrig behavioral2/memory/3888-1-0x00007FF7F5370000-0x00007FF7F56C4000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3888-0-0x00007FF7F5370000-0x00007FF7F56C4000-memory.dmp upx