General

  • Target

    11eb5fdeefbf4a91d9168e32beb0615efc99682c931548a77ec18f33d9cf895e

  • Size

    1.9MB

  • Sample

    220516-ptcbbabga5

  • MD5

    17be8440e8dbacfb60d0d36f9dcc671e

  • SHA1

    c70d1641ee7d085a21dcedf76aa4d6a204a44c2f

  • SHA256

    11eb5fdeefbf4a91d9168e32beb0615efc99682c931548a77ec18f33d9cf895e

  • SHA512

    1e3617011e141a652225fca18e2ea21b2dd27fef6cdfecb2a4e02bc23c7d30504137203bbca0d2751095ff23dfa2997d5ab8528d91ade1e006e4b77f243778fd

Score
10/10

Malware Config

Targets

    • Target

      11eb5fdeefbf4a91d9168e32beb0615efc99682c931548a77ec18f33d9cf895e

    • Size

      1.9MB

    • MD5

      17be8440e8dbacfb60d0d36f9dcc671e

    • SHA1

      c70d1641ee7d085a21dcedf76aa4d6a204a44c2f

    • SHA256

      11eb5fdeefbf4a91d9168e32beb0615efc99682c931548a77ec18f33d9cf895e

    • SHA512

      1e3617011e141a652225fca18e2ea21b2dd27fef6cdfecb2a4e02bc23c7d30504137203bbca0d2751095ff23dfa2997d5ab8528d91ade1e006e4b77f243778fd

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks