General

  • Target

    e6494eaf34fc892bd0a55f31dcbbeba9.exe

  • Size

    112KB

  • Sample

    210308-psqeza9yv6

  • MD5

    e6494eaf34fc892bd0a55f31dcbbeba9

  • SHA1

    86b68d667a0dffa7cfa32241d6081aedcccb5d30

  • SHA256

    63b82192d565071ff6ce7bbbf950a6c4dac6f5dbbf58c68f4679cb6efef28a94

  • SHA512

    969321c398308318da565b0d92d1a5d975ca08860abec77b912eaa957d8e376d1aaca1be8253833140d447319114369f705d02b1b15a9b11ae24b21e284fbb8b

Malware Config

Targets

    • Target

      e6494eaf34fc892bd0a55f31dcbbeba9.exe

    • Size

      112KB

    • MD5

      e6494eaf34fc892bd0a55f31dcbbeba9

    • SHA1

      86b68d667a0dffa7cfa32241d6081aedcccb5d30

    • SHA256

      63b82192d565071ff6ce7bbbf950a6c4dac6f5dbbf58c68f4679cb6efef28a94

    • SHA512

      969321c398308318da565b0d92d1a5d975ca08860abec77b912eaa957d8e376d1aaca1be8253833140d447319114369f705d02b1b15a9b11ae24b21e284fbb8b

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Remote System Discovery

1
T1018

Tasks