General

  • Target

    82f402c3a1371839c95ea48e39eff246f9498c5e6fc11b2d0a6d344582dd5f33

  • Size

    2.3MB

  • Sample

    220516-n4h16saea2

  • MD5

    11104d53918443e5d79c8602346fb4cb

  • SHA1

    990b0c62061ab8f52e9058d454be77b77defa37a

  • SHA256

    82f402c3a1371839c95ea48e39eff246f9498c5e6fc11b2d0a6d344582dd5f33

  • SHA512

    29c454d013a6fb61c904986bb0ba0a543ad903813071276fd41d8390b03155e8b15aef650ec7fb33330efe4c8c9e7ebe3daeb58cf26fef618542c6e67bd8d81e

Score
10/10

Malware Config

Targets

    • Target

      82f402c3a1371839c95ea48e39eff246f9498c5e6fc11b2d0a6d344582dd5f33

    • Size

      2.3MB

    • MD5

      11104d53918443e5d79c8602346fb4cb

    • SHA1

      990b0c62061ab8f52e9058d454be77b77defa37a

    • SHA256

      82f402c3a1371839c95ea48e39eff246f9498c5e6fc11b2d0a6d344582dd5f33

    • SHA512

      29c454d013a6fb61c904986bb0ba0a543ad903813071276fd41d8390b03155e8b15aef650ec7fb33330efe4c8c9e7ebe3daeb58cf26fef618542c6e67bd8d81e

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks