General

  • Target

    8b983962389da57e333e0a85460f95920374174c17850c8ca8affb10d6a06b0f

  • Size

    2.3MB

  • Sample

    220516-n2rkjachgp

  • MD5

    0304fbb59ec2aa1f1157140c73148b49

  • SHA1

    759b301545d7a05c5e38e5ea1ce7237c57172b0b

  • SHA256

    8b983962389da57e333e0a85460f95920374174c17850c8ca8affb10d6a06b0f

  • SHA512

    03e47d2a8be14b1f5e869b46f0da116c758db2fce2599c2f7c937f70eef9b4a7e70cab597977482d24e4f10ab25d937e66cd4496d50e079ad7ebe032342c74c7

Score
10/10

Malware Config

Targets

    • Target

      8b983962389da57e333e0a85460f95920374174c17850c8ca8affb10d6a06b0f

    • Size

      2.3MB

    • MD5

      0304fbb59ec2aa1f1157140c73148b49

    • SHA1

      759b301545d7a05c5e38e5ea1ce7237c57172b0b

    • SHA256

      8b983962389da57e333e0a85460f95920374174c17850c8ca8affb10d6a06b0f

    • SHA512

      03e47d2a8be14b1f5e869b46f0da116c758db2fce2599c2f7c937f70eef9b4a7e70cab597977482d24e4f10ab25d937e66cd4496d50e079ad7ebe032342c74c7

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks