General

  • Target

    0590efe4792b1cda10aa65cefdb2f524f90e4ff2da0af2c5be28cabfa52d1089

  • Size

    2.2MB

  • Sample

    220516-pw2zraeddm

  • MD5

    03c50649f4ba4a4854918810fb7327e9

  • SHA1

    1896e6360b1da7c194a49428292b1bd9a4324785

  • SHA256

    0590efe4792b1cda10aa65cefdb2f524f90e4ff2da0af2c5be28cabfa52d1089

  • SHA512

    15c44abad5f7080a8f08b5c37d7b859f9485bd730c1a369460c000aff3ef290b32ec25cfe918dfa03079557543ab7a6a313745525611ed6aeb6278eb3daafc20

Score
10/10

Malware Config

Targets

    • Target

      0590efe4792b1cda10aa65cefdb2f524f90e4ff2da0af2c5be28cabfa52d1089

    • Size

      2.2MB

    • MD5

      03c50649f4ba4a4854918810fb7327e9

    • SHA1

      1896e6360b1da7c194a49428292b1bd9a4324785

    • SHA256

      0590efe4792b1cda10aa65cefdb2f524f90e4ff2da0af2c5be28cabfa52d1089

    • SHA512

      15c44abad5f7080a8f08b5c37d7b859f9485bd730c1a369460c000aff3ef290b32ec25cfe918dfa03079557543ab7a6a313745525611ed6aeb6278eb3daafc20

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks