General

  • Target

    8fc4287a220d5acf46f53e73360b6378b59775f498954fbf7fc6c66c70a9f4bf

  • Size

    2.2MB

  • Sample

    220516-n1yx8achej

  • MD5

    0e1952c5694f5919a3d914edfb57364c

  • SHA1

    0ae5cd03fba615cdea537de2a7fd668addbbe7f4

  • SHA256

    8fc4287a220d5acf46f53e73360b6378b59775f498954fbf7fc6c66c70a9f4bf

  • SHA512

    6b69675823c37ce0233828d10193b787f245996fc96ab5399f6b4e103349cb8048a1cdfecd7a09caec537e5a5c130dc757644ac658a05a1ad2ca9323a15c9797

Score
10/10

Malware Config

Targets

    • Target

      8fc4287a220d5acf46f53e73360b6378b59775f498954fbf7fc6c66c70a9f4bf

    • Size

      2.2MB

    • MD5

      0e1952c5694f5919a3d914edfb57364c

    • SHA1

      0ae5cd03fba615cdea537de2a7fd668addbbe7f4

    • SHA256

      8fc4287a220d5acf46f53e73360b6378b59775f498954fbf7fc6c66c70a9f4bf

    • SHA512

      6b69675823c37ce0233828d10193b787f245996fc96ab5399f6b4e103349cb8048a1cdfecd7a09caec537e5a5c130dc757644ac658a05a1ad2ca9323a15c9797

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks