General
-
Target
acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509.vbs
-
Size
12.7MB
-
Sample
250131-eyn6kayjhz
-
MD5
f7650386857dd0d31fb2a1e984dfd3b5
-
SHA1
f273746309e4dff543059ec934895108dd2b6244
-
SHA256
acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509
-
SHA512
e8421e56ed514f38780d4c4d3261810c3b7374c3afad7016de0ef50905dba12d2661206162865da93ada5eeb733d9ed985fd2a4f205ee248a2ca3a3fa5607616
-
SSDEEP
49152:BnxqEP6D/zp8K91y5+30k5xTZq+4+EtVGnKTSB4IpQsBtK+gvA9hZKwPBdko9cgD:C
Static task
static1
Behavioral task
behavioral1
Sample
acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509.vbs
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509.vbs
-
Size
12.7MB
-
MD5
f7650386857dd0d31fb2a1e984dfd3b5
-
SHA1
f273746309e4dff543059ec934895108dd2b6244
-
SHA256
acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509
-
SHA512
e8421e56ed514f38780d4c4d3261810c3b7374c3afad7016de0ef50905dba12d2661206162865da93ada5eeb733d9ed985fd2a4f205ee248a2ca3a3fa5607616
-
SSDEEP
49152:BnxqEP6D/zp8K91y5+30k5xTZq+4+EtVGnKTSB4IpQsBtK+gvA9hZKwPBdko9cgD:C
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Xmrig family
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-