General
-
Target
2025-03-30_e759f83e64dcf662b7495c721d80c7ae_aspxspy_black-basta_ezcob_imuler_xmrig
-
Size
5.7MB
-
Sample
250330-th6g8svjx3
-
MD5
e759f83e64dcf662b7495c721d80c7ae
-
SHA1
1fdf23d021e3f8bc9074173e1be67884ff06acd1
-
SHA256
f1a1dcc7752b787f2a00b2d3c729c4b644e19fce70f3bbe0d82a1fd621623f4f
-
SHA512
bdb0751f40c9f0849ecb09623eca96426d77af6f77d9816c61a0569ba7fbb74916a5dd77ca08e102c124368aa94c3b19df5470adfc90ba174318cf4332264b48
-
SSDEEP
98304:z1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHr8L:zbBeSFkx
Behavioral task
behavioral1
Sample
2025-03-30_e759f83e64dcf662b7495c721d80c7ae_aspxspy_black-basta_ezcob_imuler_xmrig.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_e759f83e64dcf662b7495c721d80c7ae_aspxspy_black-basta_ezcob_imuler_xmrig.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-03-30_e759f83e64dcf662b7495c721d80c7ae_aspxspy_black-basta_ezcob_imuler_xmrig
-
Size
5.7MB
-
MD5
e759f83e64dcf662b7495c721d80c7ae
-
SHA1
1fdf23d021e3f8bc9074173e1be67884ff06acd1
-
SHA256
f1a1dcc7752b787f2a00b2d3c729c4b644e19fce70f3bbe0d82a1fd621623f4f
-
SHA512
bdb0751f40c9f0849ecb09623eca96426d77af6f77d9816c61a0569ba7fbb74916a5dd77ca08e102c124368aa94c3b19df5470adfc90ba174318cf4332264b48
-
SSDEEP
98304:z1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHr8L:zbBeSFkx
Score10/10-
Xmrig family
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-