General
-
Target
8785fb3be4516afc5b4a08fd99440b9ca929c0bd075ce31bd285b6d39f0c9e95N.exe
-
Size
5.6MB
-
Sample
241222-bm7a8axldx
-
MD5
985bdc8647356aaed8761d7776c5a900
-
SHA1
2f600b33e1b27c13a8e555375deee470cbf2c931
-
SHA256
8785fb3be4516afc5b4a08fd99440b9ca929c0bd075ce31bd285b6d39f0c9e95
-
SHA512
6714325e9d79d9690db11a39d347279aee6eb37ca3978c46fcfbed362bf58257a09fabdd2098a1294d64a8dd885b988ef6a097d57812e05bc891d68709f8b426
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
Static task
static1
Behavioral task
behavioral1
Sample
8785fb3be4516afc5b4a08fd99440b9ca929c0bd075ce31bd285b6d39f0c9e95N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
8785fb3be4516afc5b4a08fd99440b9ca929c0bd075ce31bd285b6d39f0c9e95N.exe
-
Size
5.6MB
-
MD5
985bdc8647356aaed8761d7776c5a900
-
SHA1
2f600b33e1b27c13a8e555375deee470cbf2c931
-
SHA256
8785fb3be4516afc5b4a08fd99440b9ca929c0bd075ce31bd285b6d39f0c9e95
-
SHA512
6714325e9d79d9690db11a39d347279aee6eb37ca3978c46fcfbed362bf58257a09fabdd2098a1294d64a8dd885b988ef6a097d57812e05bc891d68709f8b426
-
SSDEEP
98304:KggSZTFznDHwE8oohoIgNgx+r3P4jw4fn9E32RW0O2gT/gQGhP3oFL6p4kvDZ/Hn:DgSZJznDHMo+JgNgx+r3P+e32BO2gjgj
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-