General

  • Target

    170ed59133d073a9eec8b7636468c44c51c83c6a446b78d4db09fff03077ddff

  • Size

    1.8MB

  • Sample

    220516-pr4yjsebfm

  • MD5

    029038b13c008342ee854192ab398de1

  • SHA1

    eed3f5dbe3306059a485bd6fecb15b159d7652f2

  • SHA256

    170ed59133d073a9eec8b7636468c44c51c83c6a446b78d4db09fff03077ddff

  • SHA512

    308f268419e2d6470759706ff0f7c92e06b03d97d4db2e83c2cbc8958f1afe2e119055edc06e6b8e776febf5211f981b8f0b3c0d99d1bddf3ea74b7939645065

Score
10/10

Malware Config

Targets

    • Target

      170ed59133d073a9eec8b7636468c44c51c83c6a446b78d4db09fff03077ddff

    • Size

      1.8MB

    • MD5

      029038b13c008342ee854192ab398de1

    • SHA1

      eed3f5dbe3306059a485bd6fecb15b159d7652f2

    • SHA256

      170ed59133d073a9eec8b7636468c44c51c83c6a446b78d4db09fff03077ddff

    • SHA512

      308f268419e2d6470759706ff0f7c92e06b03d97d4db2e83c2cbc8958f1afe2e119055edc06e6b8e776febf5211f981b8f0b3c0d99d1bddf3ea74b7939645065

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks