General

  • Target

    164c89dcd2ad5533a09698ae34643bf9bbf43ce29e39bf7aaf45606ab51bb4d7

  • Size

    2.0MB

  • Sample

    220516-pr8lqsebfq

  • MD5

    0cfb27423ea0fc3d2c536546a1e63a97

  • SHA1

    96cea828df4f29eff6e73bcfbbb591dc4080a216

  • SHA256

    164c89dcd2ad5533a09698ae34643bf9bbf43ce29e39bf7aaf45606ab51bb4d7

  • SHA512

    c12a5c65c7a549e67860032d1754a48ab7872038e27177a1933de1ca4a7b272f814b884fd03690b845f4247844ce286dcdeee152a1341cbe18178d3b4eb47ea1

Score
10/10

Malware Config

Targets

    • Target

      164c89dcd2ad5533a09698ae34643bf9bbf43ce29e39bf7aaf45606ab51bb4d7

    • Size

      2.0MB

    • MD5

      0cfb27423ea0fc3d2c536546a1e63a97

    • SHA1

      96cea828df4f29eff6e73bcfbbb591dc4080a216

    • SHA256

      164c89dcd2ad5533a09698ae34643bf9bbf43ce29e39bf7aaf45606ab51bb4d7

    • SHA512

      c12a5c65c7a549e67860032d1754a48ab7872038e27177a1933de1ca4a7b272f814b884fd03690b845f4247844ce286dcdeee152a1341cbe18178d3b4eb47ea1

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks