Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 10:17
Behavioral task
behavioral1
Sample
2025-01-22_c3019a2fd3b43f29ede44b6853a2365b_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2025-01-22_c3019a2fd3b43f29ede44b6853a2365b_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
5.7MB
-
MD5
c3019a2fd3b43f29ede44b6853a2365b
-
SHA1
bac5e1d7bb9fc79503719ee6f6d4f82fe5f3b1cd
-
SHA256
37439019da95dc4e946eb367db3c65c49f44707b847297e2cc6031941332535d
-
SHA512
e09508faf9159a5eb420eacd8ebefa16c8860b5b1db7f30d49ff2a75c67af5c8ac68bb631c57eff9597bfe776df3b9f1b8285bcb273973a4a311160a13b8cc20
-
SSDEEP
98304:4emTLkNdfE0pZaJ56utgpPFotBER/mQ32lU/:j+R56utgpPF8u/7/
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 1 IoCs
resource yara_rule behavioral2/memory/4048-0-0x00007FF6C7140000-0x00007FF6C748D000-memory.dmp xmrig -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLockMemoryPrivilege 4048 2025-01-22_c3019a2fd3b43f29ede44b6853a2365b_cobalt-strike_cobaltstrike_poet-rat.exe Token: SeLockMemoryPrivilege 4048 2025-01-22_c3019a2fd3b43f29ede44b6853a2365b_cobalt-strike_cobaltstrike_poet-rat.exe