General

  • Target

    ccca5622a897b68c447ec67152486131.exe

  • Size

    112KB

  • Sample

    210706-jyrhd149dn

  • MD5

    ccca5622a897b68c447ec67152486131

  • SHA1

    3d772b348a8c542fbbb3d777f92b436c19c02053

  • SHA256

    4c580d69b3340f544a71a42bf228f7f6bccfe976dee82c13a957925e88bf71dd

  • SHA512

    49e2ed40da2dac2e8818722727054fb262b41018dcbf4a5ee883e1a9310380d67a76d3dfb94bd59d7ed6bde8933f498ee675bfec0534821ea4ef3ddc9f760caa

Malware Config

Targets

    • Target

      ccca5622a897b68c447ec67152486131.exe

    • Size

      112KB

    • MD5

      ccca5622a897b68c447ec67152486131

    • SHA1

      3d772b348a8c542fbbb3d777f92b436c19c02053

    • SHA256

      4c580d69b3340f544a71a42bf228f7f6bccfe976dee82c13a957925e88bf71dd

    • SHA512

      49e2ed40da2dac2e8818722727054fb262b41018dcbf4a5ee883e1a9310380d67a76d3dfb94bd59d7ed6bde8933f498ee675bfec0534821ea4ef3ddc9f760caa

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Deletes itself

    • Loads dropped DLL

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks