General
-
Target
9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2
-
Size
3.6MB
-
Sample
250128-nxqsfaxnd1
-
MD5
e7dd06d1755e37f24bf7971c4a2b26b0
-
SHA1
0e52e6641b80a32c065d7c0b057be4e4e42c76f3
-
SHA256
9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2
-
SHA512
98f09450f9f6b1acdc5945912d7db68ea9f1543959ba897ad262408b5686cd15345108b68e6b21647a0685dfcc63f80c6929308b2d55cd1ffce7d6e2abf6e549
-
SSDEEP
49152:mM1J3BYJUY53ZzpN66OMkhsBA/YV5IY96tOoNyki3BcmNxh+PRmOMhR:mM1J36Jbp3bBA/8IYCbYtxcm5+ZS
Static task
static1
Behavioral task
behavioral1
Sample
9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2
-
Size
3.6MB
-
MD5
e7dd06d1755e37f24bf7971c4a2b26b0
-
SHA1
0e52e6641b80a32c065d7c0b057be4e4e42c76f3
-
SHA256
9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2
-
SHA512
98f09450f9f6b1acdc5945912d7db68ea9f1543959ba897ad262408b5686cd15345108b68e6b21647a0685dfcc63f80c6929308b2d55cd1ffce7d6e2abf6e549
-
SSDEEP
49152:mM1J3BYJUY53ZzpN66OMkhsBA/YV5IY96tOoNyki3BcmNxh+PRmOMhR:mM1J36Jbp3bBA/8IYCbYtxcm5+ZS
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-