General

  • Target

    8e7f1a8348731626f09ff93a0e3af362662affa340f54d746580a8edb044a5ce

  • Size

    2.0MB

  • Sample

    220516-n169lacheq

  • MD5

    0cfdf8cb689fc139bc60e00eb12777fb

  • SHA1

    54527c18abb2e05fe59ee7b80913bbc6a7ead595

  • SHA256

    8e7f1a8348731626f09ff93a0e3af362662affa340f54d746580a8edb044a5ce

  • SHA512

    c5b2dd487104af37d05f9649c8e712af35918e796059b20fd75999772d88420249700c15098d63b8a8263e172a6bc3dd32e09715a2e6afbfd72d4bddc1573fce

Score
10/10

Malware Config

Targets

    • Target

      8e7f1a8348731626f09ff93a0e3af362662affa340f54d746580a8edb044a5ce

    • Size

      2.0MB

    • MD5

      0cfdf8cb689fc139bc60e00eb12777fb

    • SHA1

      54527c18abb2e05fe59ee7b80913bbc6a7ead595

    • SHA256

      8e7f1a8348731626f09ff93a0e3af362662affa340f54d746580a8edb044a5ce

    • SHA512

      c5b2dd487104af37d05f9649c8e712af35918e796059b20fd75999772d88420249700c15098d63b8a8263e172a6bc3dd32e09715a2e6afbfd72d4bddc1573fce

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks