General

  • Target

    06ba7e639217292b67dc9bd801f99f284c8caf52e8d1adbaeab367202df4de1d

  • Size

    2.2MB

  • Sample

    220516-pwtclsbgh6

  • MD5

    171dcad4e295c8e581c344ee74640c4d

  • SHA1

    7a2778e7c56768706af2a6575fd0d215bee5452c

  • SHA256

    06ba7e639217292b67dc9bd801f99f284c8caf52e8d1adbaeab367202df4de1d

  • SHA512

    e0879e4b778dccf791365877321c384abf885a6b7697d9961a66ab2802f331c7b76c130001b921eeea65ef91230c04a7d78d5f1f494ece2f633ffd4f7349f0e3

Score
10/10

Malware Config

Targets

    • Target

      06ba7e639217292b67dc9bd801f99f284c8caf52e8d1adbaeab367202df4de1d

    • Size

      2.2MB

    • MD5

      171dcad4e295c8e581c344ee74640c4d

    • SHA1

      7a2778e7c56768706af2a6575fd0d215bee5452c

    • SHA256

      06ba7e639217292b67dc9bd801f99f284c8caf52e8d1adbaeab367202df4de1d

    • SHA512

      e0879e4b778dccf791365877321c384abf885a6b7697d9961a66ab2802f331c7b76c130001b921eeea65ef91230c04a7d78d5f1f494ece2f633ffd4f7349f0e3

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks