General

  • Target

    846ea147a1824a4bccc4922fb65fcfd52b633e1632c6845aa9c49c15070cc751

  • Size

    2.2MB

  • Sample

    220516-n37m5sadh5

  • MD5

    055355972063977968ff30f75650edae

  • SHA1

    67dc7f3769a13e533e98eeab05134dcde758292a

  • SHA256

    846ea147a1824a4bccc4922fb65fcfd52b633e1632c6845aa9c49c15070cc751

  • SHA512

    200125dffb6a4f01ef99460e20e6b59564543d834d48ef219084435e7eddc9fa97219f2bc5779b08f4de7f327f66c210efb8cb5272600542db160596957476d1

Score
10/10

Malware Config

Targets

    • Target

      846ea147a1824a4bccc4922fb65fcfd52b633e1632c6845aa9c49c15070cc751

    • Size

      2.2MB

    • MD5

      055355972063977968ff30f75650edae

    • SHA1

      67dc7f3769a13e533e98eeab05134dcde758292a

    • SHA256

      846ea147a1824a4bccc4922fb65fcfd52b633e1632c6845aa9c49c15070cc751

    • SHA512

      200125dffb6a4f01ef99460e20e6b59564543d834d48ef219084435e7eddc9fa97219f2bc5779b08f4de7f327f66c210efb8cb5272600542db160596957476d1

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks