General

  • Target

    853c1af07f1a3efa2e06754079f81a0e8fe9d8d39cd09551853be5f079453d8c

  • Size

    1.4MB

  • Sample

    220516-n3x4psadg5

  • MD5

    1646d4dca6033b556b560e142bac8e5f

  • SHA1

    c06f7d47378b2e7004e2c0447b84414d27d9e030

  • SHA256

    853c1af07f1a3efa2e06754079f81a0e8fe9d8d39cd09551853be5f079453d8c

  • SHA512

    e366709e6a499e9c154aa7612fa840487752da7acda420676e24f9ea2f26c1de0868e20a39581a6f007fa31fadb27d63c923ff2f35d45e367c1433da2ee40f69

Score
10/10

Malware Config

Targets

    • Target

      853c1af07f1a3efa2e06754079f81a0e8fe9d8d39cd09551853be5f079453d8c

    • Size

      1.4MB

    • MD5

      1646d4dca6033b556b560e142bac8e5f

    • SHA1

      c06f7d47378b2e7004e2c0447b84414d27d9e030

    • SHA256

      853c1af07f1a3efa2e06754079f81a0e8fe9d8d39cd09551853be5f079453d8c

    • SHA512

      e366709e6a499e9c154aa7612fa840487752da7acda420676e24f9ea2f26c1de0868e20a39581a6f007fa31fadb27d63c923ff2f35d45e367c1433da2ee40f69

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks