General

  • Target

    97359fe7438222626147144293ba4db0.exe

  • Size

    2.1MB

  • Sample

    211026-pk2vlshdb9

  • MD5

    97359fe7438222626147144293ba4db0

  • SHA1

    d7150f5d6ee1d528d9dd43d3fd456ad4ed21ce7a

  • SHA256

    bd6863c35c1692f75fb5de5c772aa069df1f78e2dc1b55dea0ea4631f0644883

  • SHA512

    aca454245d9ec25e1af89b5762cb9655d8722474da809e19b9d9f3da9ad31c52ecff4c008479cda47e0a3914f8e037653a73307f1af5cebd0bcba2400ff4eaaa

Score
10/10

Malware Config

Targets

    • Target

      97359fe7438222626147144293ba4db0.exe

    • Size

      2.1MB

    • MD5

      97359fe7438222626147144293ba4db0

    • SHA1

      d7150f5d6ee1d528d9dd43d3fd456ad4ed21ce7a

    • SHA256

      bd6863c35c1692f75fb5de5c772aa069df1f78e2dc1b55dea0ea4631f0644883

    • SHA512

      aca454245d9ec25e1af89b5762cb9655d8722474da809e19b9d9f3da9ad31c52ecff4c008479cda47e0a3914f8e037653a73307f1af5cebd0bcba2400ff4eaaa

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks