Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 07:42
Behavioral task
behavioral1
Sample
202407023aa5da6338efebc247213da3d224b895cobaltstrikecobaltstrikepoetrat.exe
Resource
win7-20240508-en
9 signatures
150 seconds
General
-
Target
202407023aa5da6338efebc247213da3d224b895cobaltstrikecobaltstrikepoetrat.exe
-
Size
6.0MB
-
MD5
3aa5da6338efebc247213da3d224b895
-
SHA1
cf61ac815646410b5feafa913f9f3f1657727ee7
-
SHA256
fa8990be1e137982ac6905b22de5e6647912bf664e7f7d25443995bd2f950f0d
-
SHA512
34648e117847a366803b820ed17bece1503c46ef1755af7c136a0dc0ecb12187d971d2e3643a0b5c952603ad625ce7b16d2aff0397f6267d1b8b050c413c5881
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lUW:eOl56utgpPF8u/7W
Malware Config
Signatures
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/396-0-0x00007FF6CED90000-0x00007FF6CF0E4000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/396-0-0x00007FF6CED90000-0x00007FF6CF0E4000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/396-0-0x00007FF6CED90000-0x00007FF6CF0E4000-memory.dmpFilesize
3.3MB