General

  • Target

    activationeth.exe

  • Size

    4.7MB

  • Sample

    210627-43persn676

  • MD5

    25781b1164cba341395dee7e87f235f5

  • SHA1

    0c04dbe3e7498cd60230a4276552161a3d0c8c14

  • SHA256

    f975409470b96af02b3dd8f5ec7ce1f64fef70d06046b6fbe7fcf8e943b68cac

  • SHA512

    de8e2a1c84edfe983a89c8d2cefc87a7afe78de60c64d152ec807a0340dd3c5ebac7dec08111a63c848040037b4eaed6e21d47a175f326f7510e59d8da8bcfd4

Score
10/10

Malware Config

Targets

    • Target

      activationeth.exe

    • Size

      4.7MB

    • MD5

      25781b1164cba341395dee7e87f235f5

    • SHA1

      0c04dbe3e7498cd60230a4276552161a3d0c8c14

    • SHA256

      f975409470b96af02b3dd8f5ec7ce1f64fef70d06046b6fbe7fcf8e943b68cac

    • SHA512

      de8e2a1c84edfe983a89c8d2cefc87a7afe78de60c64d152ec807a0340dd3c5ebac7dec08111a63c848040037b4eaed6e21d47a175f326f7510e59d8da8bcfd4

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks