Analysis

  • max time kernel
    132s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 03:27

General

  • Target

    2025-01-25_1eaac20b0ec0304f39349a03888dada2_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    5.7MB

  • MD5

    1eaac20b0ec0304f39349a03888dada2

  • SHA1

    c772b0fa08de2e0f70afe803af5220baafb35ca2

  • SHA256

    8ace1b52fd2909e5ff42c7e2678422aecca8bb7248c44bbe7d1e12fcfda1e2d6

  • SHA512

    f8955d9471e31928758ae596eec742afb165749092e683b7cacbc6b3a075de3f6fccc61e4467998f8fe54d3a894e86db4ff919db00c9a50fa0d096c6e86fc84d

  • SSDEEP

    98304:4emTLkNdfE0pZaJ56utgpPFotBER/mQ32lU2:j+R56utgpPF8u/72

Score
10/10

Malware Config

Signatures

  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-25_1eaac20b0ec0304f39349a03888dada2_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-25_1eaac20b0ec0304f39349a03888dada2_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2772-0-0x000000013FD70000-0x00000001400BD000-memory.dmp

    Filesize

    3.3MB

  • memory/2772-1-0x00000000000F0000-0x0000000000100000-memory.dmp

    Filesize

    64KB