General

  • Target

    7fcd0b005d0eb12354cacf43ea73450c2dd4b6c9c662d549ccbd8fba2c51b1ab

  • Size

    2.2MB

  • Sample

    220516-n4631aaeb8

  • MD5

    133a1b07165aaf8bc3ba49ed63e85b2a

  • SHA1

    4bffcfb9185ecad1e6f45c86fa19d265d989539c

  • SHA256

    7fcd0b005d0eb12354cacf43ea73450c2dd4b6c9c662d549ccbd8fba2c51b1ab

  • SHA512

    f257a86aacf0eb2a3d92b3459cadde11daabc26db600fff5946d92b0fe1662e97a688346bc70e9386448ab3d53f9e9310474a376708c887ffa6c42bbecbc089a

Score
10/10

Malware Config

Targets

    • Target

      7fcd0b005d0eb12354cacf43ea73450c2dd4b6c9c662d549ccbd8fba2c51b1ab

    • Size

      2.2MB

    • MD5

      133a1b07165aaf8bc3ba49ed63e85b2a

    • SHA1

      4bffcfb9185ecad1e6f45c86fa19d265d989539c

    • SHA256

      7fcd0b005d0eb12354cacf43ea73450c2dd4b6c9c662d549ccbd8fba2c51b1ab

    • SHA512

      f257a86aacf0eb2a3d92b3459cadde11daabc26db600fff5946d92b0fe1662e97a688346bc70e9386448ab3d53f9e9310474a376708c887ffa6c42bbecbc089a

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks