General

  • Target

    mixazed_20210714-064051

  • Size

    69KB

  • Sample

    210714-wxy47aaxm2

  • MD5

    e8eb372e50f48742c1edbb8aea8bfd8d

  • SHA1

    18364f4335899a39c7722844ac024d727b92e618

  • SHA256

    6d49bc2bfb252f1dcce05a4a884dd342b682c56e1e3cc57381c714796e9ac134

  • SHA512

    0366f8f7c153523106632908ff0ec524480d13bbf3399901c809c210081229383d0f9b39a1dc9c5eaa0466e6f4e6aa435088ab65e783b4d2e3a40b6423d47137

Score
10/10

Malware Config

Targets

    • Target

      mixazed_20210714-064051

    • Size

      69KB

    • MD5

      e8eb372e50f48742c1edbb8aea8bfd8d

    • SHA1

      18364f4335899a39c7722844ac024d727b92e618

    • SHA256

      6d49bc2bfb252f1dcce05a4a884dd342b682c56e1e3cc57381c714796e9ac134

    • SHA512

      0366f8f7c153523106632908ff0ec524480d13bbf3399901c809c210081229383d0f9b39a1dc9c5eaa0466e6f4e6aa435088ab65e783b4d2e3a40b6423d47137

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks