General
-
Target
2025-04-23_c88f7d6f431b220c8ccfc3d67aa78780_akira_black-basta_coinminer_hijackloader
-
Size
16.0MB
-
Sample
250423-nakynswtfs
-
MD5
c88f7d6f431b220c8ccfc3d67aa78780
-
SHA1
ebad358687be90cbf17857e9d9f010ca2eef5dbf
-
SHA256
f74e2e5f72d752f7d3803fb26ed57c583007aa6eb55a603c8ab647d0f15b1f55
-
SHA512
0f7baa118443aeac320b48df35525677e039e52dc64a5dee7cf9f6f833e0240ff62c0604eda2c9f9c222b79c55b8b68d80e5bd6a1f98b652066c803f22a8b0ea
-
SSDEEP
393216:kfpMGalEprdC2ho79h0ZVTNL8Mpb8wreosW56GzSu+:GMMpb8w6iAGz6
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-23_c88f7d6f431b220c8ccfc3d67aa78780_akira_black-basta_coinminer_hijackloader.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-23_c88f7d6f431b220c8ccfc3d67aa78780_akira_black-basta_coinminer_hijackloader.exe
Resource
win11-20250410-en
Malware Config
Extracted
stealc
GlobalThird
62.60.226.20
-
url_path
/3fdfaab96bf0423c.php
Extracted
remcos
6.1.1 Light
LightAutov3
62.60.226.21:40106
62.60.226.101:40106
62.60.226.21:40105
62.60.226.101:40105
62.60.226.101:40104
62.60.226.21:40104
62.60.226.21:40103
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
1
-
connect_interval
1
-
copy_file
ZoomUpdateApi.exe
-
copy_folder
ZoomUpdate
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
errors.dat
-
keylog_flag
false
-
keylog_folder
ZoomUpdateReport
-
mouse_option
false
-
mutex
ZoomUpdateService-8DUEEB
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
ZoomApiRec
-
screenshot_path
%Temp%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
2025-04-23_c88f7d6f431b220c8ccfc3d67aa78780_akira_black-basta_coinminer_hijackloader
-
Size
16.0MB
-
MD5
c88f7d6f431b220c8ccfc3d67aa78780
-
SHA1
ebad358687be90cbf17857e9d9f010ca2eef5dbf
-
SHA256
f74e2e5f72d752f7d3803fb26ed57c583007aa6eb55a603c8ab647d0f15b1f55
-
SHA512
0f7baa118443aeac320b48df35525677e039e52dc64a5dee7cf9f6f833e0240ff62c0604eda2c9f9c222b79c55b8b68d80e5bd6a1f98b652066c803f22a8b0ea
-
SSDEEP
393216:kfpMGalEprdC2ho79h0ZVTNL8Mpb8wreosW56GzSu+:GMMpb8w6iAGz6
-
Detects Rhadamanthys payload
-
Remcos family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-