General

  • Target

    csrss.exe

  • Size

    2.9MB

  • Sample

    211201-yez89sfchq

  • MD5

    62e98ca6b2bf484e6fbbc537fd49167a

  • SHA1

    b8fbfaaeadb02dde6461132bf63a9faa4a89987e

  • SHA256

    cbc85816ce4d841628d343113b3ae6843402062835a9da85da1064f58e840517

  • SHA512

    684cd2a043b71b288a515a8df26e4f374afcec9de9cdb6d80068e24f6eeea7adf9c141e6df172ec4cb2a09edbf3da2a9e0120ff8a086800c52f5c7cc998799d8

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://k2ygoods.ydns.eu/power.txt

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://2652435.f3322.org/power.txt

Targets

    • Target

      csrss.exe

    • Size

      2.9MB

    • MD5

      62e98ca6b2bf484e6fbbc537fd49167a

    • SHA1

      b8fbfaaeadb02dde6461132bf63a9faa4a89987e

    • SHA256

      cbc85816ce4d841628d343113b3ae6843402062835a9da85da1064f58e840517

    • SHA512

      684cd2a043b71b288a515a8df26e4f374afcec9de9cdb6d80068e24f6eeea7adf9c141e6df172ec4cb2a09edbf3da2a9e0120ff8a086800c52f5c7cc998799d8

    • suricata: ET MALWARE Downloaded Script Disables Firewall/Antivirus

      suricata: ET MALWARE Downloaded Script Disables Firewall/Antivirus

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Command-Line Interface

1
T1059

Persistence

Modify Existing Service

2
T1031

Hidden Files and Directories

2
T1158

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Hidden Files and Directories

2
T1158

Impair Defenses

1
T1562

Discovery

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks