Source: svchost.exe, 0000000D.00000002.2131806167.000001D639800000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.ver) |
Source: edb.log.13.dr | String found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20 |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF25817000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387B2C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://github.com |
Source: powershell.exe, 00000005.00000002.1364575138.000001BF34401000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1364575138.000001BF342CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1595093978.00000272101B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1498144988.00000272019B4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1595093978.000002721007C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF25867000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387B79000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://objects.githubusercontent.com |
Source: powershell.exe, 00000009.00000002.1498144988.0000027200222000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: svchost.exe, 0000000D.00000002.2130300430.000001D6342B1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/enumeration/Enumerate |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF24251000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1498144988.0000027200001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.1671666039.000001314869D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000009.00000002.1498144988.0000027200222000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: svchost.exe, 00000012.00000002.1440886455.0000025DCC213000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.bingmapsportal.com |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF24251000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1498144988.0000027200001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.1671666039.0000013148688000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.1671666039.000001314869D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net |
Source: powershell.exe, 00000009.00000002.1595093978.000002721007C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000009.00000002.1595093978.000002721007C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000009.00000002.1595093978.000002721007C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/ |
Source: svchost.exe, 00000012.00000003.1431448776.0000025DCC25D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441135085.0000025DCC27F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440062439.0000025DCC240000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1431958185.0000025DCC259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1431283067.0000025DCC269000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441001888.0000025DCC241000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations |
Source: svchost.exe, 00000012.00000003.1431338492.0000025DCC264000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441110879.0000025DCC265000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/ |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx |
Source: svchost.exe, 00000012.00000003.1431958185.0000025DCC259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1431283067.0000025DCC269000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations |
Source: svchost.exe, 00000012.00000003.1431338492.0000025DCC264000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1440935876.0000025DCC22B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441110879.0000025DCC265000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/ |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking |
Source: svchost.exe, 00000012.00000003.1440062439.0000025DCC240000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441001888.0000025DCC241000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/ |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx |
Source: svchost.exe, 00000012.00000003.1440062439.0000025DCC240000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441083689.0000025DCC262000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441001888.0000025DCC241000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1431378159.0000025DCC261000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log? |
Source: svchost.exe, 00000012.00000003.1431378159.0000025DCC261000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000012.00000002.1441001888.0000025DCC241000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000012.00000002.1441083689.0000025DCC262000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1431378159.0000025DCC261000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r= |
Source: svchost.exe, 00000012.00000003.1440062439.0000025DCC240000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441001888.0000025DCC241000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r= |
Source: svchost.exe, 00000012.00000002.1441001888.0000025DCC241000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.t |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx |
Source: svchost.exe, 00000012.00000003.1440062439.0000025DCC240000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/ |
Source: svchost.exe, 00000012.00000003.1431338492.0000025DCC264000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1440935876.0000025DCC22B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441110879.0000025DCC265000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/ |
Source: edb.log.13.dr | String found in binary or memory: https://g.live.com/odclientsettings/Prod1C: |
Source: svchost.exe, 0000000D.00000003.1206128932.000001D639670000.00000004.00000800.00020000.00000000.sdmp, edb.log.13.dr | String found in binary or memory: https://g.live.com/odclientsettings/ProdV21C: |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF25201000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1303391671.000001BF24472000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387812000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.000002238732C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com |
Source: powershell.exe, 00000009.00000002.1498144988.0000027200222000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000010.00000002.1487918627.0000022384F30000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.000002238732C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/letzchipman7/fallen/releases/download/v1.0.0/win_init.exe |
Source: win_init.exe, 00000021.00000002.1803688818.000000C000218000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://github.com/letzchipman7/fallen/releases/download/v1.0.0/xmrig-hidden.exe |
Source: esFK2gm.exe, 00000000.00000002.2131272483.000000C0000CA000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://github.com/letzchipman7/fallen/releases/download/v1.0.0/xmrig-hidden.exeSoftware |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF25201000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1498144988.0000027200DCD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.1671666039.0000013148B43000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000005.00000002.1364575138.000001BF34401000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1364575138.000001BF342CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1595093978.00000272101B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1498144988.00000272019B4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1595093978.000002721007C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF25845000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1303391671.000001BF245F4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387B57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387451000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubusercontent.com |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF25845000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1303391671.000001BF245F4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387B57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387451000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubusercontent.com/github-production-release-asset-2e65be/941574414/b85117f6-f40e |
Source: win_init.exe, 0000001E.00000002.1619147975.000000C000138000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 00000021.00000002.1803688818.000000C00021A000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubusercontent.com/github-production-release-asset-2e65be/941574414/ea8c5442-d9b8 |
Source: powershell.exe, 00000005.00000002.1303391671.000001BF25845000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1491070014.0000022387B57000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://objects.githubuserconth |
Source: esFK2gm.exe, 00000000.00000002.2131272483.000000C0001B0000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://pastebin.com/raw/i3kvksAW |
Source: svchost.exe, 00000012.00000003.1440197993.0000025DCC231000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.sshL# |
Source: svchost.exe, 00000012.00000003.1440197993.0000025DCC231000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1440958719.0000025DCC235000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak |
Source: svchost.exe, 00000012.00000003.1440197993.0000025DCC231000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.til(P# |
Source: svchost.exe, 00000012.00000003.1440197993.0000025DCC231000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.viPF# |
Source: svchost.exe, 00000012.00000003.1440197993.0000025DCC231000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtu |
Source: svchost.exe, 00000012.00000003.1440062439.0000025DCC240000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx |
Source: svchost.exe, 00000012.00000003.1440032872.0000025DCC24B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441001888.0000025DCC241000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r= |
Source: svchost.exe, 00000012.00000003.1440032872.0000025DCC24B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1441001888.0000025DCC241000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r= |
Source: svchost.exe, 00000012.00000002.1440935876.0000025DCC22B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r= |
Source: svchost.exe, 00000012.00000003.1440197993.0000025DCC231000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.1440958719.0000025DCC235000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/pS# |
Source: svchost.exe, 00000012.00000003.1440197993.0000025DCC231000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.netxK# |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen |
Source: svchost.exe, 00000012.00000002.1441044858.0000025DCC257000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.1440158956.0000025DCC256000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north= |
Source: esFK2gm.exe, 00000000.00000002.2136754074.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, esFK2gm.exe, 00000000.00000002.2135744163.000000C000400000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 0000001E.00000002.1621539104.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 00000021.00000002.1805169349.000000C000C00000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/benchmark/%s |
Source: esFK2gm.exe, 00000000.00000002.2136754074.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, esFK2gm.exe, 00000000.00000002.2135744163.000000C000400000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 0000001E.00000002.1621539104.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 00000021.00000002.1805169349.000000C000C00000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/docs/algorithms |
Source: esFK2gm.exe, 00000000.00000002.2136754074.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, esFK2gm.exe, 00000000.00000002.2135744163.000000C000400000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 0000001E.00000002.1621539104.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 00000021.00000002.1805169349.000000C000C00000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/wizard |
Source: esFK2gm.exe, 00000000.00000002.2136754074.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, esFK2gm.exe, 00000000.00000002.2135744163.000000C000400000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 0000001E.00000002.1621539104.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, win_init.exe, 00000021.00000002.1805169349.000000C000C00000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: https://xmrig.com/wizard%s |
Source: sslproxydump.pcap, type: PCAP | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 0.2.esFK2gm.exe.c000a90000.3.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 0.2.esFK2gm.exe.c000a90000.3.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 0.2.esFK2gm.exe.c000a90000.3.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 30.2.win_init.exe.c0009f0000.13.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 30.2.win_init.exe.c0009f0000.13.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 30.2.win_init.exe.c0009f0000.13.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 33.2.win_init.exe.c000a8a000.14.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 33.2.win_init.exe.c000a8a000.14.unpack, type: UNPACKEDPE | Matched rule: Detects Monero Crypto Coin Miner Author: Florian Roth |
Source: 33.2.win_init.exe.c000a8a000.14.unpack, type: UNPACKEDPE | Matched rule: Detects coinmining malware Author: ditekSHen |
Source: 00000000.00000002.2135744163.000000C000400000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 00000000.00000002.2136754074.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 00000021.00000002.1805169349.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: 0000001E.00000002.1621539104.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: Process Memory Space: esFK2gm.exe PID: 6424, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: Process Memory Space: win_init.exe PID: 916, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: Process Memory Space: win_init.exe PID: 6092, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown |
Source: sslproxydump.pcap, type: PCAP | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 0.2.esFK2gm.exe.c000a90000.3.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 0.2.esFK2gm.exe.c000a90000.3.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 0.2.esFK2gm.exe.c000a90000.3.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 30.2.win_init.exe.c0009f0000.13.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 30.2.win_init.exe.c0009f0000.13.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 30.2.win_init.exe.c0009f0000.13.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 33.2.win_init.exe.c000a8a000.14.unpack, type: UNPACKEDPE | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 33.2.win_init.exe.c000a8a000.14.unpack, type: UNPACKEDPE | Matched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/ |
Source: 33.2.win_init.exe.c000a8a000.14.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware |
Source: 00000000.00000002.2135744163.000000C000400000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 00000000.00000002.2136754074.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 00000021.00000002.1805169349.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: 0000001E.00000002.1621539104.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: Process Memory Space: esFK2gm.exe PID: 6424, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: Process Memory Space: win_init.exe PID: 916, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |
Source: Process Memory Space: win_init.exe PID: 6092, type: MEMORYSTR | Matched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25 |