General
-
Target
2025-04-07_4bc4a4f8ca36aa1255b2dc7d6381972c_aspxspy_black-basta_ezcob_imuler_xmrig
-
Size
5.7MB
-
Sample
250407-m8hersxsf1
-
MD5
4bc4a4f8ca36aa1255b2dc7d6381972c
-
SHA1
865b8521c9ef5673dabfde0e55a7e3ecaebfdfa4
-
SHA256
27e5d486fa635f54bcde82d0d1c940d6aaa18e3ff00a77896cd47f1955b03ea1
-
SHA512
4a6fc99c4e4ff2c936118026358beab370d72e649b39ecc34058d9b39ea544ea94aa80cf4053f03ffefff17d2e9a62e66ca37bacab0ed1097ddbe8ad6e73f7a1
-
SSDEEP
98304:z1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHr8D:zbBeSFkd
Behavioral task
behavioral1
Sample
2025-04-07_4bc4a4f8ca36aa1255b2dc7d6381972c_aspxspy_black-basta_ezcob_imuler_xmrig.exe
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
2025-04-07_4bc4a4f8ca36aa1255b2dc7d6381972c_aspxspy_black-basta_ezcob_imuler_xmrig
-
Size
5.7MB
-
MD5
4bc4a4f8ca36aa1255b2dc7d6381972c
-
SHA1
865b8521c9ef5673dabfde0e55a7e3ecaebfdfa4
-
SHA256
27e5d486fa635f54bcde82d0d1c940d6aaa18e3ff00a77896cd47f1955b03ea1
-
SHA512
4a6fc99c4e4ff2c936118026358beab370d72e649b39ecc34058d9b39ea544ea94aa80cf4053f03ffefff17d2e9a62e66ca37bacab0ed1097ddbe8ad6e73f7a1
-
SSDEEP
98304:z1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHr8D:zbBeSFkd
Score10/10-
Xmrig family
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-