General

  • Target

    91eae6dc22d761e9c2b1aeb559300897baf92f196f61d73fac31fd01637f96ab

  • Size

    3.5MB

  • Sample

    211210-pydpyagdh5

  • MD5

    8e5c1e555efa573a260317b057f5ed0c

  • SHA1

    e62c2f828baf2d62b1dab38e1b5e3bef66f1bd75

  • SHA256

    91eae6dc22d761e9c2b1aeb559300897baf92f196f61d73fac31fd01637f96ab

  • SHA512

    26cf922e1b9a5906de95165581dd7b1867a93f431eb020d49362614b17efa868f2a0e32f13fa0e1902c5e0e77cf50156df45b9539ff49362421823a57de04776

Malware Config

Targets

    • Target

      91eae6dc22d761e9c2b1aeb559300897baf92f196f61d73fac31fd01637f96ab

    • Size

      3.5MB

    • MD5

      8e5c1e555efa573a260317b057f5ed0c

    • SHA1

      e62c2f828baf2d62b1dab38e1b5e3bef66f1bd75

    • SHA256

      91eae6dc22d761e9c2b1aeb559300897baf92f196f61d73fac31fd01637f96ab

    • SHA512

      26cf922e1b9a5906de95165581dd7b1867a93f431eb020d49362614b17efa868f2a0e32f13fa0e1902c5e0e77cf50156df45b9539ff49362421823a57de04776

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Hidden Files and Directories

1
T1158

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks