General

  • Target

    8C5B1765BE823AED40005938FFE187B65695022920B7F.exe

  • Size

    1.3MB

  • Sample

    210625-p39ljg93sx

  • MD5

    5ba6b57de0f7a435cc0c812e08edd466

  • SHA1

    7a8d5b48c912d622864f601e04344d15841ff52d

  • SHA256

    8c5b1765be823aed40005938ffe187b65695022920b7f2908ab36fa823379d71

  • SHA512

    5be2415505e8a811a0904bac36a02d8a22c48eb2d4e3d0bce3290bc10630901827cf3d4c9e8d8199e9264f50dfc04412cc7496feadb1e8f62356ddf7bb4b96aa

Malware Config

Targets

    • Target

      8C5B1765BE823AED40005938FFE187B65695022920B7F.exe

    • Size

      1.3MB

    • MD5

      5ba6b57de0f7a435cc0c812e08edd466

    • SHA1

      7a8d5b48c912d622864f601e04344d15841ff52d

    • SHA256

      8c5b1765be823aed40005938ffe187b65695022920b7f2908ab36fa823379d71

    • SHA512

      5be2415505e8a811a0904bac36a02d8a22c48eb2d4e3d0bce3290bc10630901827cf3d4c9e8d8199e9264f50dfc04412cc7496feadb1e8f62356ddf7bb4b96aa

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Tasks