General

  • Target

    1709b4176ad2a94539795b6e10a4b23d27180474adf3d360dbb416681b30868e

  • Size

    1.8MB

  • Sample

    220516-pr5j3sebfn

  • MD5

    0304ae557e2f3ee27af4567eb6dbdbd7

  • SHA1

    34e158acbc98e92d92b3ce83b7d90a3598b9fad2

  • SHA256

    1709b4176ad2a94539795b6e10a4b23d27180474adf3d360dbb416681b30868e

  • SHA512

    f262a08b476ac77a7d81366abe6caa30fd38fba7c4992dcf8dc25ee7d999d8af3b31825121edbb7bd22fb592c40f1caa09fd073ecd683b4aaa5ac77bd85be59f

Score
10/10

Malware Config

Targets

    • Target

      1709b4176ad2a94539795b6e10a4b23d27180474adf3d360dbb416681b30868e

    • Size

      1.8MB

    • MD5

      0304ae557e2f3ee27af4567eb6dbdbd7

    • SHA1

      34e158acbc98e92d92b3ce83b7d90a3598b9fad2

    • SHA256

      1709b4176ad2a94539795b6e10a4b23d27180474adf3d360dbb416681b30868e

    • SHA512

      f262a08b476ac77a7d81366abe6caa30fd38fba7c4992dcf8dc25ee7d999d8af3b31825121edbb7bd22fb592c40f1caa09fd073ecd683b4aaa5ac77bd85be59f

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks