General
-
Target
Fatality.exe
-
Size
2.1MB
-
Sample
250124-25lekstkhx
-
MD5
ab637a979ba3f9e64730d0d64bf55dc7
-
SHA1
2701c106d3b66aa75852f82dfadef0c791e7bc87
-
SHA256
f43db369e0af2af2f1b0abb8da9963e79f21c724b65d2a59db67ca5e4379fb19
-
SHA512
120c9af2442d107d38bde79f80445bff0862e7dde6aa8c3388f0a69061588b0baee10e4ac9cfffcdb25728823e388bc6487e2fe447c758e4dd22d4168c8b7165
-
SSDEEP
49152:r6yNBEGdFePFvVY09GPY9YuQHz/ITi4Na:r6yv/dcbY6YzQi4Na
Static task
static1
Behavioral task
behavioral1
Sample
Fatality.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
Fatality.exe
-
Size
2.1MB
-
MD5
ab637a979ba3f9e64730d0d64bf55dc7
-
SHA1
2701c106d3b66aa75852f82dfadef0c791e7bc87
-
SHA256
f43db369e0af2af2f1b0abb8da9963e79f21c724b65d2a59db67ca5e4379fb19
-
SHA512
120c9af2442d107d38bde79f80445bff0862e7dde6aa8c3388f0a69061588b0baee10e4ac9cfffcdb25728823e388bc6487e2fe447c758e4dd22d4168c8b7165
-
SSDEEP
49152:r6yNBEGdFePFvVY09GPY9YuQHz/ITi4Na:r6yv/dcbY6YzQi4Na
-
Xmrig family
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-