General

  • Target

    84a997aa9835a306f9584cc6b33391d4e9b01e1bc28579cd12109fa8a18f1609

  • Size

    2.3MB

  • Sample

    220516-n355baadh3

  • MD5

    10625305beb1c63802b36d460ba2f30e

  • SHA1

    a0aef5c65af7fd6073159cf4c6c467f67a599aae

  • SHA256

    84a997aa9835a306f9584cc6b33391d4e9b01e1bc28579cd12109fa8a18f1609

  • SHA512

    1a4409808a3e88fa5b34771996f654dfa815d3f46735b44a80843a90c60e407ea9b69556fed3ec9602afd507894d02629c05b2adacee189e86d751a86483f8ae

Score
10/10

Malware Config

Targets

    • Target

      84a997aa9835a306f9584cc6b33391d4e9b01e1bc28579cd12109fa8a18f1609

    • Size

      2.3MB

    • MD5

      10625305beb1c63802b36d460ba2f30e

    • SHA1

      a0aef5c65af7fd6073159cf4c6c467f67a599aae

    • SHA256

      84a997aa9835a306f9584cc6b33391d4e9b01e1bc28579cd12109fa8a18f1609

    • SHA512

      1a4409808a3e88fa5b34771996f654dfa815d3f46735b44a80843a90c60e407ea9b69556fed3ec9602afd507894d02629c05b2adacee189e86d751a86483f8ae

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks