General

  • Target

    c67b1ffb63818072eb4cc935b3f51ed5

  • Size

    29KB

  • Sample

    210703-6tqs2mar3s

  • MD5

    c67b1ffb63818072eb4cc935b3f51ed5

  • SHA1

    b9e836e247b4e0456bf8359a3508891bc418ac46

  • SHA256

    c4a2ff17b64e24fbf00d70d2d4b996332cb7a4767f2c27e6a2ff93999cc44e67

  • SHA512

    f839cff63143f0f3d8a5dfb8e058d7277fb1779b808458774ca1982d1a762a5a310e05a6581645bcdb9dbcbb6e3087f3bcff4048d7c81926edf35120d6ec4724

Score
10/10

Malware Config

Targets

    • Target

      c67b1ffb63818072eb4cc935b3f51ed5

    • Size

      29KB

    • MD5

      c67b1ffb63818072eb4cc935b3f51ed5

    • SHA1

      b9e836e247b4e0456bf8359a3508891bc418ac46

    • SHA256

      c4a2ff17b64e24fbf00d70d2d4b996332cb7a4767f2c27e6a2ff93999cc44e67

    • SHA512

      f839cff63143f0f3d8a5dfb8e058d7277fb1779b808458774ca1982d1a762a5a310e05a6581645bcdb9dbcbb6e3087f3bcff4048d7c81926edf35120d6ec4724

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks