General

  • Target

    d331a53d_by_Libranalysis

  • Size

    118KB

  • Sample

    210505-ynmhgsacgj

  • MD5

    d331a53d6deced27e44a1b23a897c660

  • SHA1

    a96d6f7f562943794a632b7071c2bc228477ed6f

  • SHA256

    29051e0cdfd29405d4766b2d09e93c03b190fc71d094d11fb0e7bc998187689d

  • SHA512

    632b1a37d395a9dad7e2ac1c47007b98c877f187ecf564935fa1cb9062ceed13eacd98cc9782e815d616c204e38e9c3bef43f4223c3f69a4b94562e899543a18

Score
10/10

Malware Config

Targets

    • Target

      d331a53d_by_Libranalysis

    • Size

      118KB

    • MD5

      d331a53d6deced27e44a1b23a897c660

    • SHA1

      a96d6f7f562943794a632b7071c2bc228477ed6f

    • SHA256

      29051e0cdfd29405d4766b2d09e93c03b190fc71d094d11fb0e7bc998187689d

    • SHA512

      632b1a37d395a9dad7e2ac1c47007b98c877f187ecf564935fa1cb9062ceed13eacd98cc9782e815d616c204e38e9c3bef43f4223c3f69a4b94562e899543a18

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks