General

  • Target

    313a2beb0a7cc0c1d763339ea4a58705deacb0f222b8113dbfa8aa0cfd1c5297

  • Size

    477KB

  • Sample

    210513-5tvamngvqs

  • MD5

    0ffd87a198719090f53bf74fedc89844

  • SHA1

    670ded197734c25593e69da9f6a9dba7a986bf93

  • SHA256

    313a2beb0a7cc0c1d763339ea4a58705deacb0f222b8113dbfa8aa0cfd1c5297

  • SHA512

    d6136d807424dea537cb6f26f32c91cf67c83a964e5b3e7215d5c0930a562e08d44f63b0c81df7b3291a5281fade69a472f73da4ed497ee8f99cbfc3d3ccd93c

Malware Config

Targets

    • Target

      313a2beb0a7cc0c1d763339ea4a58705deacb0f222b8113dbfa8aa0cfd1c5297

    • Size

      477KB

    • MD5

      0ffd87a198719090f53bf74fedc89844

    • SHA1

      670ded197734c25593e69da9f6a9dba7a986bf93

    • SHA256

      313a2beb0a7cc0c1d763339ea4a58705deacb0f222b8113dbfa8aa0cfd1c5297

    • SHA512

      d6136d807424dea537cb6f26f32c91cf67c83a964e5b3e7215d5c0930a562e08d44f63b0c81df7b3291a5281fade69a472f73da4ed497ee8f99cbfc3d3ccd93c

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks