General

  • Target

    1233300cf2399ef767ce103f027f1bf588af56becd842a1dbc1d1c0ab876c205

  • Size

    2.2MB

  • Sample

    220516-ps7qtsbga3

  • MD5

    1369d9f5faf973f3ac19e9fd2f18df79

  • SHA1

    05f4763f34096cc021136bdf44f8089c006d562b

  • SHA256

    1233300cf2399ef767ce103f027f1bf588af56becd842a1dbc1d1c0ab876c205

  • SHA512

    7d4d44c365507b8972254a1c0ac9262c33b71ca14cd28228b308024af9061e75422cfe9d135c12786328197aeaeb977e5c21dd261883b3523910b930e848d91f

Score
10/10

Malware Config

Targets

    • Target

      1233300cf2399ef767ce103f027f1bf588af56becd842a1dbc1d1c0ab876c205

    • Size

      2.2MB

    • MD5

      1369d9f5faf973f3ac19e9fd2f18df79

    • SHA1

      05f4763f34096cc021136bdf44f8089c006d562b

    • SHA256

      1233300cf2399ef767ce103f027f1bf588af56becd842a1dbc1d1c0ab876c205

    • SHA512

      7d4d44c365507b8972254a1c0ac9262c33b71ca14cd28228b308024af9061e75422cfe9d135c12786328197aeaeb977e5c21dd261883b3523910b930e848d91f

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks