General
-
Target
1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321.cmd
-
Size
400B
-
Sample
250125-j15csavqdn
-
MD5
2eeefd9c6e45d4aa21861b1296f67585
-
SHA1
a946bbc6ddecbfc98e418f5cd268fd9e31012f21
-
SHA256
1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321
-
SHA512
ae169104fd73052c11deadc0b3470e6a64e53edc17818e75576c0077eef27a7633c6c94ea96f9ebfe4321f6184d448dd9b218aee35e6ffea40a446308af844e0
Static task
static1
Behavioral task
behavioral1
Sample
1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321.cmd
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321.cmd
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://biteblob.com/Download/J4wO2GduKNJmX3/build.exe
Targets
-
-
Target
1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321.cmd
-
Size
400B
-
MD5
2eeefd9c6e45d4aa21861b1296f67585
-
SHA1
a946bbc6ddecbfc98e418f5cd268fd9e31012f21
-
SHA256
1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321
-
SHA512
ae169104fd73052c11deadc0b3470e6a64e53edc17818e75576c0077eef27a7633c6c94ea96f9ebfe4321f6184d448dd9b218aee35e6ffea40a446308af844e0
Score10/10-
Xmrig family
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Creates new service(s)
-
Downloads MZ/PE file
-
Stops running service(s)
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-