General

  • Target

    eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1

  • Size

    1.1MB

  • Sample

    210511-ndpq9jcw3x

  • MD5

    e709b49637fe6417c4a0d87bae495ba1

  • SHA1

    8b72aa4fa153b9f06d91eb83367223692b7e3720

  • SHA256

    eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1

  • SHA512

    f53381207787b2c67c0708ca6605b6aded2f06fb946ab9f38dfa6c75d8289edfd84743af214256a83a16f656671d1d15c37778d3b0a2bc1a567dee75c936fbb1

Malware Config

Targets

    • Target

      eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1

    • Size

      1.1MB

    • MD5

      e709b49637fe6417c4a0d87bae495ba1

    • SHA1

      8b72aa4fa153b9f06d91eb83367223692b7e3720

    • SHA256

      eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1

    • SHA512

      f53381207787b2c67c0708ca6605b6aded2f06fb946ab9f38dfa6c75d8289edfd84743af214256a83a16f656671d1d15c37778d3b0a2bc1a567dee75c936fbb1

    • Modifies visiblity of hidden/system files in Explorer

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks