General

  • Target

    0cbd6364a52e8b8381953205b721b3df2caea9b88096965965dce65f1ff2a751

  • Size

    2.2MB

  • Sample

    220516-pvjrsabgd5

  • MD5

    0e35970710eda4e1b2bb571c7cec98df

  • SHA1

    a25a02e9fd405f88f695ce585ff6d23f46ea2c74

  • SHA256

    0cbd6364a52e8b8381953205b721b3df2caea9b88096965965dce65f1ff2a751

  • SHA512

    26c483bf4f984bd09bcc5b22740e785c6998cb22433fa3c07db934675af2e5517695fc9bc9af05fd8dbd5b9624b52d7a20eacecc1369cd429c2cb97cc9084bd5

Score
10/10

Malware Config

Targets

    • Target

      0cbd6364a52e8b8381953205b721b3df2caea9b88096965965dce65f1ff2a751

    • Size

      2.2MB

    • MD5

      0e35970710eda4e1b2bb571c7cec98df

    • SHA1

      a25a02e9fd405f88f695ce585ff6d23f46ea2c74

    • SHA256

      0cbd6364a52e8b8381953205b721b3df2caea9b88096965965dce65f1ff2a751

    • SHA512

      26c483bf4f984bd09bcc5b22740e785c6998cb22433fa3c07db934675af2e5517695fc9bc9af05fd8dbd5b9624b52d7a20eacecc1369cd429c2cb97cc9084bd5

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks