General

  • Target

    5812427987648512.zip

  • Size

    39KB

  • Sample

    210629-r3ygwcw9wa

  • MD5

    b8676f9b2d4257af2a870e858d4f13e8

  • SHA1

    60f1c0b6ed3747fad2fb0b5a8a7f5faabe37af88

  • SHA256

    f2a8dabd037c92d854324a1d0cb3065cfce298067cb8a988cbcdc3feb9060ba5

  • SHA512

    a2a6bba13517fc24ef36d946214fbe7119ee7e52b20aed42bbecf6453c42d6205f78a34f84eff942172d7b154a54cadf3d77c6a116317f4a171f4eb24e38d02b

Score
10/10

Malware Config

Targets

    • Target

      7c0eeffa5484e06f67768d2e8e2cfce00f08efd544e19cb8701b81a04be078ee

    • Size

      41KB

    • MD5

      eafd1c6531d9a70d99f78a7bd99ae36e

    • SHA1

      42e8512b09c76d5f668c7442a440d5558a2377a3

    • SHA256

      7c0eeffa5484e06f67768d2e8e2cfce00f08efd544e19cb8701b81a04be078ee

    • SHA512

      0c26a8243e60a60f2aed8bc2a153b27faafc649cb0bcf4ca063cf1d9223cf14f2562441e828072fab6834b49579b39cf992f39d6562a4d9dd276af5170252b4f

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks