General

  • Target

    6bfaff1d987b257a2cecada27743464472ccc1a3099ea4dce9fc124664a8c77d

  • Size

    507KB

  • Sample

    210513-bdjcv78kn2

  • MD5

    56a65bdcd8ac98ea90b9aec9bfe2b5e4

  • SHA1

    189fde58d647edd83940de632dde978dd7a3823c

  • SHA256

    6bfaff1d987b257a2cecada27743464472ccc1a3099ea4dce9fc124664a8c77d

  • SHA512

    3005d1336e7abc98323635422c149d3d35eebf950a1cebb08e91db43896dca765d73635d786d37fdc1b6f209aeee1e84370570e9b35368642929aace33228e2f

Malware Config

Targets

    • Target

      6bfaff1d987b257a2cecada27743464472ccc1a3099ea4dce9fc124664a8c77d

    • Size

      507KB

    • MD5

      56a65bdcd8ac98ea90b9aec9bfe2b5e4

    • SHA1

      189fde58d647edd83940de632dde978dd7a3823c

    • SHA256

      6bfaff1d987b257a2cecada27743464472ccc1a3099ea4dce9fc124664a8c77d

    • SHA512

      3005d1336e7abc98323635422c149d3d35eebf950a1cebb08e91db43896dca765d73635d786d37fdc1b6f209aeee1e84370570e9b35368642929aace33228e2f

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks