General
-
Target
RIMIX X!TRE.rar
-
Size
2.6MB
-
Sample
241224-vbza1ssnap
-
MD5
fd958f314b715e2aba5e181789516467
-
SHA1
8c329504987d695a40813b89ba93391225b53135
-
SHA256
2aba29deec0bd0dc4d028360b9abdd30dc3b81b0e20bb40e3be7e5cb3240f76c
-
SHA512
207d5e91c232614c2980c22920fd746ded1c01cfee8ca24a00310418266addc9e6de2c8137ee416b9779ba89580e75038559cdc7d5d2906bae1b0e189fa388c6
-
SSDEEP
49152:x8Rknfy2QmkasYluLNGAegv0fjZvXjHEmGlawcbkR4it+uxKKwvYa:aGnK2QaI4Jgc6Vc8Kl1
Static task
static1
Behavioral task
behavioral1
Sample
RIMIX X!TRE.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
RIMIX X!TRE.exe
-
Size
3.9MB
-
MD5
4b341683eae9ea9941df5fd7e60c7a09
-
SHA1
9318f92e924f54fdd856dac5839220af15cd8601
-
SHA256
0bffdd22b6c00bbe5da4a1cf4e84089cf8c50c7aa93993b652b2dedcd5d75237
-
SHA512
65805b2daade2b204c7b3316ea69c91feb6133c7bba70ccf36eba7abb83d087565e9bb450292afc83416dc04b66ee8ce26304cc46e37f480a081913e760683ef
-
SSDEEP
98304:fJs+xKkTwxRk+LkcddlstjcX9LqHpy96KZB:hxNwxiArlwjcX9L/6+
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-