General

  • Target

    f40b137db9bc978f5e32bdd45ac0cd6f52f61ea5c49ef3660a786352df1a3ecd

  • Size

    354KB

  • Sample

    210513-v7zn9y1vwa

  • MD5

    83442bfd37caf80bddd456fcdc21348c

  • SHA1

    d9545548080bbd21772fb1498fc14f6ef05f2394

  • SHA256

    f40b137db9bc978f5e32bdd45ac0cd6f52f61ea5c49ef3660a786352df1a3ecd

  • SHA512

    16a136a80599751e3aa6c96aa58bec9b84fdddd21b3e98aeb9ac0f35678c496f990683d89ec350306d9ef9cd8d8e3164100dbdafaf699fe814698e6b864c5b81

Malware Config

Targets

    • Target

      f40b137db9bc978f5e32bdd45ac0cd6f52f61ea5c49ef3660a786352df1a3ecd

    • Size

      354KB

    • MD5

      83442bfd37caf80bddd456fcdc21348c

    • SHA1

      d9545548080bbd21772fb1498fc14f6ef05f2394

    • SHA256

      f40b137db9bc978f5e32bdd45ac0cd6f52f61ea5c49ef3660a786352df1a3ecd

    • SHA512

      16a136a80599751e3aa6c96aa58bec9b84fdddd21b3e98aeb9ac0f35678c496f990683d89ec350306d9ef9cd8d8e3164100dbdafaf699fe814698e6b864c5b81

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks