General

  • Target

    20d0f3a8ae795b85fd86cac5ef665e46

  • Size

    15.9MB

  • Sample

    211014-q3h1wsadcl

  • MD5

    20d0f3a8ae795b85fd86cac5ef665e46

  • SHA1

    cb969dfeee0fac7c84e0de81c1d56641ad068871

  • SHA256

    b96c79ff7e741638ee99fc0461688440276bdb9df395d5325915408efd174876

  • SHA512

    8cdac7f54ea45ac7282056037d90c58580af4351ce4994ab52d805ea4b1fbb6fb236fa5137f31ac39b5f65e9fd4b02442da9dc14be0e365c6002d8b3e1c724a7

Score
10/10

Malware Config

Targets

    • Target

      20d0f3a8ae795b85fd86cac5ef665e46

    • Size

      15.9MB

    • MD5

      20d0f3a8ae795b85fd86cac5ef665e46

    • SHA1

      cb969dfeee0fac7c84e0de81c1d56641ad068871

    • SHA256

      b96c79ff7e741638ee99fc0461688440276bdb9df395d5325915408efd174876

    • SHA512

      8cdac7f54ea45ac7282056037d90c58580af4351ce4994ab52d805ea4b1fbb6fb236fa5137f31ac39b5f65e9fd4b02442da9dc14be0e365c6002d8b3e1c724a7

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detected Stratum cryptominer command

      Looks to be attempting to contact Stratum mining pool.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Hidden Files and Directories

1
T1158

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks