General

  • Target

    new.exe

  • Size

    9.8MB

  • Sample

    220403-2azcysabdl

  • MD5

    e3852b214e150bf17bb2ddd731a34dd8

  • SHA1

    13fbc7a7902168b3e394dfeae8968f61ce54e9d0

  • SHA256

    7845ed63bc0f6ce0e656fa6ef8fe5cc4559c4c0b9dfbfb8b6db5005370fb66e4

  • SHA512

    77ac2228a435dae79f7072a3a0e9c05df519e7c0baa93a1457b59927c4d7176e084f5e27b4f406ec6f6b6d3d45d6f3055c3a441781317989f3c9a0f66c1c6915

Malware Config

Targets

    • Target

      new.exe

    • Size

      9.8MB

    • MD5

      e3852b214e150bf17bb2ddd731a34dd8

    • SHA1

      13fbc7a7902168b3e394dfeae8968f61ce54e9d0

    • SHA256

      7845ed63bc0f6ce0e656fa6ef8fe5cc4559c4c0b9dfbfb8b6db5005370fb66e4

    • SHA512

      77ac2228a435dae79f7072a3a0e9c05df519e7c0baa93a1457b59927c4d7176e084f5e27b4f406ec6f6b6d3d45d6f3055c3a441781317989f3c9a0f66c1c6915

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Modify Existing Service

1
T1031

Defense Evasion

Hidden Files and Directories

2
T1158

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks