General

  • Target

    0841a5d72218196589f3627c73d79dca28eb8236595c982ac368c8a041949ce0

  • Size

    2.3MB

  • Sample

    220516-pwhk4sedck

  • MD5

    1959dea1a364c7cdb965d7f369de70e7

  • SHA1

    889c78a39859485b4f354cfb3282188eed60e92c

  • SHA256

    0841a5d72218196589f3627c73d79dca28eb8236595c982ac368c8a041949ce0

  • SHA512

    44ed36eeed665c59e2fc2ce205a1b045cbb720c782f6a5d48de83bec9e7f2d76a43e597ce1150764d06cae97af173f1b7760d1c614fc248536f195bf4af0e957

Score
10/10

Malware Config

Targets

    • Target

      0841a5d72218196589f3627c73d79dca28eb8236595c982ac368c8a041949ce0

    • Size

      2.3MB

    • MD5

      1959dea1a364c7cdb965d7f369de70e7

    • SHA1

      889c78a39859485b4f354cfb3282188eed60e92c

    • SHA256

      0841a5d72218196589f3627c73d79dca28eb8236595c982ac368c8a041949ce0

    • SHA512

      44ed36eeed665c59e2fc2ce205a1b045cbb720c782f6a5d48de83bec9e7f2d76a43e597ce1150764d06cae97af173f1b7760d1c614fc248536f195bf4af0e957

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks