General

  • Target

    x64.exe

  • Size

    32KB

  • Sample

    210507-r9sre1s6r2

  • MD5

    e65f3463068c583ba9ec1aabc08d1cd5

  • SHA1

    97eca180a490fbf6fdbbb96eee1769d315594ad7

  • SHA256

    8af4a9ab3943a49bda13ba1af87ea3a5934efb29b3f0de9284744a155cab0f0f

  • SHA512

    a552b3a386e89a3e04fa85d9dbee2557ee7c44e8be33ebb33f3f9bb00eb3392b6b10f733092e93831a47ea7ac5bec316e6d970d7026227595951103009e22b05

Malware Config

Targets

    • Target

      x64.exe

    • Size

      32KB

    • MD5

      e65f3463068c583ba9ec1aabc08d1cd5

    • SHA1

      97eca180a490fbf6fdbbb96eee1769d315594ad7

    • SHA256

      8af4a9ab3943a49bda13ba1af87ea3a5934efb29b3f0de9284744a155cab0f0f

    • SHA512

      a552b3a386e89a3e04fa85d9dbee2557ee7c44e8be33ebb33f3f9bb00eb3392b6b10f733092e93831a47ea7ac5bec316e6d970d7026227595951103009e22b05

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks