General

  • Target

    13fa43840622531a8985edb38dfa79014e07056ab4b8335e98d91ab394be13a6

  • Size

    2.4MB

  • Sample

    220516-psrdvaecap

  • MD5

    017e8747731918b71591c8e77c18340d

  • SHA1

    98643db22e0c108d1d0c131d2338999908651811

  • SHA256

    13fa43840622531a8985edb38dfa79014e07056ab4b8335e98d91ab394be13a6

  • SHA512

    4dca47ac6ecead3f7eae9f5a4ebb9cc1d9e9d67e060e5470e26eb676ff31ca6ac299a6778921acbfd0030d44e8f0bb9063b89381eea85115ecdcb6cb4fa7f3b9

Score
10/10

Malware Config

Targets

    • Target

      13fa43840622531a8985edb38dfa79014e07056ab4b8335e98d91ab394be13a6

    • Size

      2.4MB

    • MD5

      017e8747731918b71591c8e77c18340d

    • SHA1

      98643db22e0c108d1d0c131d2338999908651811

    • SHA256

      13fa43840622531a8985edb38dfa79014e07056ab4b8335e98d91ab394be13a6

    • SHA512

      4dca47ac6ecead3f7eae9f5a4ebb9cc1d9e9d67e060e5470e26eb676ff31ca6ac299a6778921acbfd0030d44e8f0bb9063b89381eea85115ecdcb6cb4fa7f3b9

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks