General
-
Target
lolz.exe
-
Size
5.0MB
-
Sample
250129-x1wbrsxjfy
-
MD5
c814bb1eb11d8e69b2b13982d658d79c
-
SHA1
8ee6766f76a243b8b32107a97930020a7a8eef50
-
SHA256
b4f0d77f5688afdcbd0e8ee79dbd30a734280878cc4ffe1fac1f3cdebc4c5605
-
SHA512
ae2d10e498589f42530995c4cffda917239a8a216468ff264cb0fe8de703e51f78612053d5c86521e0e30863c1ccd36322587b9828ee8f0679dbb7c2bad0628c
-
SSDEEP
98304:zdPupPUwdawGgC3D+euvqKYzbupsOismK03mUHzcvO8xwahthJsq:zZwdawGPDf8Ebuxo9wvrzhJsq
Static task
static1
Behavioral task
behavioral1
Sample
lolz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lolz.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
lolz.exe
-
Size
5.0MB
-
MD5
c814bb1eb11d8e69b2b13982d658d79c
-
SHA1
8ee6766f76a243b8b32107a97930020a7a8eef50
-
SHA256
b4f0d77f5688afdcbd0e8ee79dbd30a734280878cc4ffe1fac1f3cdebc4c5605
-
SHA512
ae2d10e498589f42530995c4cffda917239a8a216468ff264cb0fe8de703e51f78612053d5c86521e0e30863c1ccd36322587b9828ee8f0679dbb7c2bad0628c
-
SSDEEP
98304:zdPupPUwdawGgC3D+euvqKYzbupsOismK03mUHzcvO8xwahthJsq:zZwdawGPDf8Ebuxo9wvrzhJsq
Score10/10-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-