General

  • Target

    c26d2b9cca40517263c2bbaa6e990a0c

  • Size

    2.8MB

  • Sample

    201214-r5nxzlk4t2

  • MD5

    c26d2b9cca40517263c2bbaa6e990a0c

  • SHA1

    e11400714e98054da858d1afc378f7e9ef1bc27e

  • SHA256

    1bfb6e94a2aa3dc20da4a8ddd84ff530dceb6cbccf6a5e7a5b14fefc2c95ba8a

  • SHA512

    1a2dde8ca6a69e1afb7dd85672f395517abcbccd1ab074f7197c647e2bd2a2099cec7e830bef804fc375a0f093d9f82442f93d497c209120dac37e15a7e8bef4

Malware Config

Targets

    • Target

      c26d2b9cca40517263c2bbaa6e990a0c

    • Size

      2.8MB

    • MD5

      c26d2b9cca40517263c2bbaa6e990a0c

    • SHA1

      e11400714e98054da858d1afc378f7e9ef1bc27e

    • SHA256

      1bfb6e94a2aa3dc20da4a8ddd84ff530dceb6cbccf6a5e7a5b14fefc2c95ba8a

    • SHA512

      1a2dde8ca6a69e1afb7dd85672f395517abcbccd1ab074f7197c647e2bd2a2099cec7e830bef804fc375a0f093d9f82442f93d497c209120dac37e15a7e8bef4

    • FakeAV, RogueAntivirus

      FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • FakeAV payload

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks