General

  • Target

    74461ad319cfe5aec800322c1739b8979a91b03801ab5ef4e19bd588f3a1795e.exe

  • Size

    4.1MB

  • Sample

    210628-dwkk82a2rx

  • MD5

    3f1e77ac601f75be3063a254960c5518

  • SHA1

    e6ddde852f8cd2de6f69569eaaea7bf1c5db9d2f

  • SHA256

    74461ad319cfe5aec800322c1739b8979a91b03801ab5ef4e19bd588f3a1795e

  • SHA512

    86feca7c2748fbd4d12c7a33abbec47f4f20fc76821e18aa8407402aa7ce57f84797f4a054282748370ea30730ae6258266a625d3948e65a8704d255ef96905a

Score
10/10

Malware Config

Targets

    • Target

      74461ad319cfe5aec800322c1739b8979a91b03801ab5ef4e19bd588f3a1795e.exe

    • Size

      4.1MB

    • MD5

      3f1e77ac601f75be3063a254960c5518

    • SHA1

      e6ddde852f8cd2de6f69569eaaea7bf1c5db9d2f

    • SHA256

      74461ad319cfe5aec800322c1739b8979a91b03801ab5ef4e19bd588f3a1795e

    • SHA512

      86feca7c2748fbd4d12c7a33abbec47f4f20fc76821e18aa8407402aa7ce57f84797f4a054282748370ea30730ae6258266a625d3948e65a8704d255ef96905a

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks