General

  • Target

    Defender.exe

  • Size

    8.3MB

  • Sample

    210627-pzkfxphx9x

  • MD5

    87fa7a1ee39276516b9753556897546d

  • SHA1

    8c5db106bdda5304dc65a439d4bf806751117424

  • SHA256

    788490416fe054993a1a4033b0f287399167eaad913a1cfc24efe324246645f4

  • SHA512

    c7a9db600886f816b561aa9c73ba25784294b4d5ee537990c6b5efc4d0ed4adc3e728865bd7da692be3dc4f7e57efebadaa36d00b49075f046dacfce9136fe8f

Score
10/10

Malware Config

Targets

    • Target

      Defender.exe

    • Size

      8.3MB

    • MD5

      87fa7a1ee39276516b9753556897546d

    • SHA1

      8c5db106bdda5304dc65a439d4bf806751117424

    • SHA256

      788490416fe054993a1a4033b0f287399167eaad913a1cfc24efe324246645f4

    • SHA512

      c7a9db600886f816b561aa9c73ba25784294b4d5ee537990c6b5efc4d0ed4adc3e728865bd7da692be3dc4f7e57efebadaa36d00b49075f046dacfce9136fe8f

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks