General

  • Target

    15ade8b627fee632efffe05ebfa9aa749ee1feade46cf54e90bd1f65ab9067d6

  • Size

    2.3MB

  • Sample

    220516-pscwfsebgm

  • MD5

    1c8cf1d2bdcab696739d68be4b217d51

  • SHA1

    3474eae5101761213f4319b7fecc2da2655ce5fa

  • SHA256

    15ade8b627fee632efffe05ebfa9aa749ee1feade46cf54e90bd1f65ab9067d6

  • SHA512

    2796ca3aefcc3d55cabbc30dc4cd15348c38e7d41cdce98ea8198349a3195f2685c68218a6400f0878dff32f94a1f605171ad50c8eed9d5da967175af180ba5b

Score
10/10

Malware Config

Targets

    • Target

      15ade8b627fee632efffe05ebfa9aa749ee1feade46cf54e90bd1f65ab9067d6

    • Size

      2.3MB

    • MD5

      1c8cf1d2bdcab696739d68be4b217d51

    • SHA1

      3474eae5101761213f4319b7fecc2da2655ce5fa

    • SHA256

      15ade8b627fee632efffe05ebfa9aa749ee1feade46cf54e90bd1f65ab9067d6

    • SHA512

      2796ca3aefcc3d55cabbc30dc4cd15348c38e7d41cdce98ea8198349a3195f2685c68218a6400f0878dff32f94a1f605171ad50c8eed9d5da967175af180ba5b

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks