General

  • Target

    0e054ed4224ed4ecbbbcedbcf2676e8aab95e433f6b74b916126d20f9f155431

  • Size

    2.1MB

  • Sample

    220516-pt9a2sbgc5

  • MD5

    0d2a8c9139a03253a275938c79f3ad76

  • SHA1

    27549c849cec28d1fcb52618902a7a415a1f9ba7

  • SHA256

    0e054ed4224ed4ecbbbcedbcf2676e8aab95e433f6b74b916126d20f9f155431

  • SHA512

    6b04d0d2d427b02a0288a7fcd3224b72a3d8d842f50d7decfcc347152f061a2245f30871f7a10b04479329d4cbdc513b334de5ccaadf5d7356c79e7b17800df4

Score
10/10

Malware Config

Targets

    • Target

      0e054ed4224ed4ecbbbcedbcf2676e8aab95e433f6b74b916126d20f9f155431

    • Size

      2.1MB

    • MD5

      0d2a8c9139a03253a275938c79f3ad76

    • SHA1

      27549c849cec28d1fcb52618902a7a415a1f9ba7

    • SHA256

      0e054ed4224ed4ecbbbcedbcf2676e8aab95e433f6b74b916126d20f9f155431

    • SHA512

      6b04d0d2d427b02a0288a7fcd3224b72a3d8d842f50d7decfcc347152f061a2245f30871f7a10b04479329d4cbdc513b334de5ccaadf5d7356c79e7b17800df4

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks