Analysis
-
max time kernel
91s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 06:31
Behavioral task
behavioral1
Sample
2024-12-29_f46ca44f588afbfab8813d4fb8e5979d_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
11 signatures
150 seconds
General
-
Target
2024-12-29_f46ca44f588afbfab8813d4fb8e5979d_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.0MB
-
MD5
f46ca44f588afbfab8813d4fb8e5979d
-
SHA1
ab61f4cef9a686f0454527b10a089a1b83a8f59e
-
SHA256
803d7bad818193759bb6fde39127f13a7fbe2e3404f21816937f098c76a7da13
-
SHA512
03e5c4e250f57fb8bb4ef776b6febf730bbc74e6a994f6cc9f798c2bb0c51f9e99a8fe9e162e53a9fbd3646da22366407d5ec1c5576417987bbf2284cc379ac2
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lUx:eOl56utgpPF8u/7x
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/1812-0-0x00007FF6F5300000-0x00007FF6F5654000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/1812-0-0x00007FF6F5300000-0x00007FF6F5654000-memory.dmp upx