General

  • Target

    135ce703cd668155f48fb792e01d8b5d2b1ae3fcf978dc4dd1c29670f5218d41

  • Size

    1.9MB

  • Sample

    220516-psvfhaecar

  • MD5

    0ae15611d47d3a729717ae7dea8b37a1

  • SHA1

    8537b181dfa64bc61d38527781189a55e5fa15c2

  • SHA256

    135ce703cd668155f48fb792e01d8b5d2b1ae3fcf978dc4dd1c29670f5218d41

  • SHA512

    9c78206be7fe60078a6f497d2d7a4cae3cb56eb7a0c94c5114ad84c662326d36e7aaf07fbb5680d435cea774579ff6e2d7bab7d1d8aca75db598f28ef86bdc2e

Score
10/10

Malware Config

Targets

    • Target

      135ce703cd668155f48fb792e01d8b5d2b1ae3fcf978dc4dd1c29670f5218d41

    • Size

      1.9MB

    • MD5

      0ae15611d47d3a729717ae7dea8b37a1

    • SHA1

      8537b181dfa64bc61d38527781189a55e5fa15c2

    • SHA256

      135ce703cd668155f48fb792e01d8b5d2b1ae3fcf978dc4dd1c29670f5218d41

    • SHA512

      9c78206be7fe60078a6f497d2d7a4cae3cb56eb7a0c94c5114ad84c662326d36e7aaf07fbb5680d435cea774579ff6e2d7bab7d1d8aca75db598f28ef86bdc2e

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks