General

  • Target

    8ea689cc8bdf377c332667cdbb88fc47c9ca31475223d706bc19b41c7b467ea5

  • Size

    1.5MB

  • Sample

    220516-n14hpschen

  • MD5

    013ebb8531f0f2f316fc3d93a84b2335

  • SHA1

    6439d4284f65a1cca1efe0a52595c9a81a262036

  • SHA256

    8ea689cc8bdf377c332667cdbb88fc47c9ca31475223d706bc19b41c7b467ea5

  • SHA512

    eb75645bcf456c22c42a930c1d719503e00fe601cfea6d2edf385c2ed7c2bcf010f25787885cea0754bad34722037bffb1c4d3a186a04e12fea0abb4ef35acac

Score
10/10

Malware Config

Targets

    • Target

      8ea689cc8bdf377c332667cdbb88fc47c9ca31475223d706bc19b41c7b467ea5

    • Size

      1.5MB

    • MD5

      013ebb8531f0f2f316fc3d93a84b2335

    • SHA1

      6439d4284f65a1cca1efe0a52595c9a81a262036

    • SHA256

      8ea689cc8bdf377c332667cdbb88fc47c9ca31475223d706bc19b41c7b467ea5

    • SHA512

      eb75645bcf456c22c42a930c1d719503e00fe601cfea6d2edf385c2ed7c2bcf010f25787885cea0754bad34722037bffb1c4d3a186a04e12fea0abb4ef35acac

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks