General

  • Target

    863d9d61382f05575687ae84e287a1c7c31155f08ab25a396505d021341a61c6

  • Size

    1.7MB

  • Sample

    220516-n3q1dsadf8

  • MD5

    01af2dd6938f0774e7d403414f195d51

  • SHA1

    ad7de431654f79cfc687577332fd78c514d299ab

  • SHA256

    863d9d61382f05575687ae84e287a1c7c31155f08ab25a396505d021341a61c6

  • SHA512

    421f51d0da240298e183d355d9d11b9b48285e2c38c334611467d27438242fdfe5f501ce4f7394e8f18f039b2d89c47784db7eea1a2c52e9bbed8270eba4f3c2

Score
10/10

Malware Config

Targets

    • Target

      863d9d61382f05575687ae84e287a1c7c31155f08ab25a396505d021341a61c6

    • Size

      1.7MB

    • MD5

      01af2dd6938f0774e7d403414f195d51

    • SHA1

      ad7de431654f79cfc687577332fd78c514d299ab

    • SHA256

      863d9d61382f05575687ae84e287a1c7c31155f08ab25a396505d021341a61c6

    • SHA512

      421f51d0da240298e183d355d9d11b9b48285e2c38c334611467d27438242fdfe5f501ce4f7394e8f18f039b2d89c47784db7eea1a2c52e9bbed8270eba4f3c2

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks