General

  • Target

    a024795c1658919d6d486d5b5ec3cf3d.exe

  • Size

    79KB

  • Sample

    211020-g68w2shfdl

  • MD5

    a024795c1658919d6d486d5b5ec3cf3d

  • SHA1

    43252185f8b73d64cd398010bca860ec1ac94b52

  • SHA256

    6c37eeda0f1f8b8a33b982e32864e819a2f493fba1615cbca2724264de8ca340

  • SHA512

    4dc88c03e5f382189c1e05ecf2361a6606c21a3ab3ce4397b2c8cd272899bdb0d7a8a638dc64a681b36d39ec819dfaf405c0d1bc64622684673eaa3f11fee0ae

Score
10/10

Malware Config

Targets

    • Target

      a024795c1658919d6d486d5b5ec3cf3d.exe

    • Size

      79KB

    • MD5

      a024795c1658919d6d486d5b5ec3cf3d

    • SHA1

      43252185f8b73d64cd398010bca860ec1ac94b52

    • SHA256

      6c37eeda0f1f8b8a33b982e32864e819a2f493fba1615cbca2724264de8ca340

    • SHA512

      4dc88c03e5f382189c1e05ecf2361a6606c21a3ab3ce4397b2c8cd272899bdb0d7a8a638dc64a681b36d39ec819dfaf405c0d1bc64622684673eaa3f11fee0ae

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks