General

  • Target

    7fb4bc02c317b69c178833f4af693b75.zip

  • Size

    2.5MB

  • Sample

    210304-9fp2nm74e2

  • MD5

    06398dcfe64ba52b16f4fd6a8ab4bec0

  • SHA1

    df2f451ced7afa02b0db3606764efab22e104396

  • SHA256

    888b7bc3df8c1d6faff37cf5384a9575e03f7c36e4fa461200be5220745e23f2

  • SHA512

    1f7bbc6217ee0fa5238235689ea412bc04de56ac35ba25a948a982fbf858b4fc8f9a6e671ff44dc12af71e471d871eeed88dc2129f45b2d6127b0a019fe1080d

Malware Config

Targets

    • Target

      7fb4bc02c317b69c178833f4af693b75

    • Size

      2.5MB

    • MD5

      7fb4bc02c317b69c178833f4af693b75

    • SHA1

      e2eb8284141f776f6d564e22b80d70f0dfd5a6f1

    • SHA256

      8cec146d7a7b594cf7748b35c63ea1fed2c994ef2cdbb5731f1b15d9c9fa1ee3

    • SHA512

      4e02db238bb5a9081de6384f2e16b3c85f782b84f0f71fdbaec50abaf8b6ba60075a3f512bd67d644d4ced2410a782adcae4f9ca25232825e9e6c64212758108

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Hidden Files and Directories

2
T1158

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Hidden Files and Directories

2
T1158

File Permissions Modification

1
T1222

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks