General

  • Target

    04988d1ba52e19a1caa1f244f79c85308447242442bb650e2d988203fb374659

  • Size

    2.0MB

  • Sample

    220516-pw6ypsbhb3

  • MD5

    01ae4764e70b84f9f2e16e14260cd1b9

  • SHA1

    25012a483192432589658e2f3a7505b6935d7bf5

  • SHA256

    04988d1ba52e19a1caa1f244f79c85308447242442bb650e2d988203fb374659

  • SHA512

    146f0356693bba5cbeb0ebd1d7f02fce0106a79ca058ee87b7cd3da772a8566813869c26e167c35672ec1f28fccdcff50885b76809db6d103e56c552f6d1a70f

Score
10/10

Malware Config

Targets

    • Target

      04988d1ba52e19a1caa1f244f79c85308447242442bb650e2d988203fb374659

    • Size

      2.0MB

    • MD5

      01ae4764e70b84f9f2e16e14260cd1b9

    • SHA1

      25012a483192432589658e2f3a7505b6935d7bf5

    • SHA256

      04988d1ba52e19a1caa1f244f79c85308447242442bb650e2d988203fb374659

    • SHA512

      146f0356693bba5cbeb0ebd1d7f02fce0106a79ca058ee87b7cd3da772a8566813869c26e167c35672ec1f28fccdcff50885b76809db6d103e56c552f6d1a70f

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks