General

  • Target

    04802f8ed295f1f6a05dde8615257e7f99e6094661085b3279e48f750f46466d

  • Size

    2.2MB

  • Sample

    220516-pw833aedej

  • MD5

    17bcdddb54c4984953029a419fcd8ae9

  • SHA1

    43be09ea00c5830867e45bb57ed08c9d98ccd8ef

  • SHA256

    04802f8ed295f1f6a05dde8615257e7f99e6094661085b3279e48f750f46466d

  • SHA512

    b3da55444447640b73bc7a4ffbaa6ac6844adf0e11922fd855ca06499385aaf7e93fd53b108cc8d541c83d0bd82d5f18e0c203e57611901fb9ff3f793fd8c2ec

Score
10/10

Malware Config

Targets

    • Target

      04802f8ed295f1f6a05dde8615257e7f99e6094661085b3279e48f750f46466d

    • Size

      2.2MB

    • MD5

      17bcdddb54c4984953029a419fcd8ae9

    • SHA1

      43be09ea00c5830867e45bb57ed08c9d98ccd8ef

    • SHA256

      04802f8ed295f1f6a05dde8615257e7f99e6094661085b3279e48f750f46466d

    • SHA512

      b3da55444447640b73bc7a4ffbaa6ac6844adf0e11922fd855ca06499385aaf7e93fd53b108cc8d541c83d0bd82d5f18e0c203e57611901fb9ff3f793fd8c2ec

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks