General

  • Target

    12782967d350632593512264b257358c26a6161a42616b34926ec08a0cc4c108

  • Size

    1.9MB

  • Sample

    220516-ps4n6sbfh8

  • MD5

    03fd3d4ff571b5855f55c9f4c5f63fbd

  • SHA1

    4586054abfc521f68c4552ef6f7cc33ed628e46b

  • SHA256

    12782967d350632593512264b257358c26a6161a42616b34926ec08a0cc4c108

  • SHA512

    a59ec8510c257ec9e864727dbe68716929b7ff3dc9ca7cc70b0d7350dc680af69f496eef3059635daba31b00c6eb5c673e1d18e19841e1704f2c84d478f2cea0

Score
10/10

Malware Config

Targets

    • Target

      12782967d350632593512264b257358c26a6161a42616b34926ec08a0cc4c108

    • Size

      1.9MB

    • MD5

      03fd3d4ff571b5855f55c9f4c5f63fbd

    • SHA1

      4586054abfc521f68c4552ef6f7cc33ed628e46b

    • SHA256

      12782967d350632593512264b257358c26a6161a42616b34926ec08a0cc4c108

    • SHA512

      a59ec8510c257ec9e864727dbe68716929b7ff3dc9ca7cc70b0d7350dc680af69f496eef3059635daba31b00c6eb5c673e1d18e19841e1704f2c84d478f2cea0

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks