General

  • Target

    0f65b4fa711b40e3c89a81fa69d8690f

  • Size

    16KB

  • Sample

    210723-5jgpe4bq2j

  • MD5

    0f65b4fa711b40e3c89a81fa69d8690f

  • SHA1

    19240a26f205be2f8b4f4e00583a987e184f2875

  • SHA256

    af18c1e923667ab287cd2699203e0bb6e6030dee131299ea670bc842dec76745

  • SHA512

    82a3f01024ebf9c56c6f77d4c51003d3892e6da40a0efea34e08ddcca6786f3e3e7b6e2b18a95bf407c723a770f71e94eb90f68fb18726513a0dbac35b7e8f52

Score
10/10

Malware Config

Targets

    • Target

      0f65b4fa711b40e3c89a81fa69d8690f

    • Size

      16KB

    • MD5

      0f65b4fa711b40e3c89a81fa69d8690f

    • SHA1

      19240a26f205be2f8b4f4e00583a987e184f2875

    • SHA256

      af18c1e923667ab287cd2699203e0bb6e6030dee131299ea670bc842dec76745

    • SHA512

      82a3f01024ebf9c56c6f77d4c51003d3892e6da40a0efea34e08ddcca6786f3e3e7b6e2b18a95bf407c723a770f71e94eb90f68fb18726513a0dbac35b7e8f52

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks