General

  • Target

    04814fc1cd4276f79f3b2e5f82c62f5f787163f57968ed122eb0d38f10b30154

  • Size

    2.3MB

  • Sample

    220516-pw76rseddr

  • MD5

    102b6538cb06371fe601ec8d4da17720

  • SHA1

    07d3ccbecbae1b48ce6b5062b802e0cff360687b

  • SHA256

    04814fc1cd4276f79f3b2e5f82c62f5f787163f57968ed122eb0d38f10b30154

  • SHA512

    3379ee1c07633ffacec5108ab8ec16942ea3912e6cab20329018bfb37f27dff3688ce47652da61e3d51acd456419be8abeec92b96d802df6068963460eadff07

Score
10/10

Malware Config

Targets

    • Target

      04814fc1cd4276f79f3b2e5f82c62f5f787163f57968ed122eb0d38f10b30154

    • Size

      2.3MB

    • MD5

      102b6538cb06371fe601ec8d4da17720

    • SHA1

      07d3ccbecbae1b48ce6b5062b802e0cff360687b

    • SHA256

      04814fc1cd4276f79f3b2e5f82c62f5f787163f57968ed122eb0d38f10b30154

    • SHA512

      3379ee1c07633ffacec5108ab8ec16942ea3912e6cab20329018bfb37f27dff3688ce47652da61e3d51acd456419be8abeec92b96d802df6068963460eadff07

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks