General

  • Target

    f4594ae4012521944a46ee1add8f70f16db1c8c415e259640b19d6da10b26651

  • Size

    6.3MB

  • Sample

    210301-4sv7hr3wm6

  • MD5

    362127796f414fd034ec53cff073728c

  • SHA1

    03de6175bf62645dbb2d467df2af217a01c7767f

  • SHA256

    f4594ae4012521944a46ee1add8f70f16db1c8c415e259640b19d6da10b26651

  • SHA512

    94a16867ab82661b3cee547a514df6402e9a3d1f53e78e9c1c3c2a16ec45b932556b2abc84b2b331f99fcca54a8e087e2d9569ee5965e24b55230ae2bd398f7d

Malware Config

Targets

    • Target

      f4594ae4012521944a46ee1add8f70f16db1c8c415e259640b19d6da10b26651

    • Size

      6.3MB

    • MD5

      362127796f414fd034ec53cff073728c

    • SHA1

      03de6175bf62645dbb2d467df2af217a01c7767f

    • SHA256

      f4594ae4012521944a46ee1add8f70f16db1c8c415e259640b19d6da10b26651

    • SHA512

      94a16867ab82661b3cee547a514df6402e9a3d1f53e78e9c1c3c2a16ec45b932556b2abc84b2b331f99fcca54a8e087e2d9569ee5965e24b55230ae2bd398f7d

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Cryptocurrency Miner

      Makes network request to known mining pool URL.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks