General

  • Target

    034bbc6af2aa726b3e31735e52ec1617bfca41cd5257f5e857f95e18772e437f

  • Size

    2.2MB

  • Sample

    220516-pxk3maedfj

  • MD5

    05d8d3620c53301291b61d802aa47582

  • SHA1

    7c2d35f50662afb44baee66361c1c1d552808952

  • SHA256

    034bbc6af2aa726b3e31735e52ec1617bfca41cd5257f5e857f95e18772e437f

  • SHA512

    f996ad0c3c0eee160c4a073c3caa230ec92b4af000a3bfe7632fbcd6c8df2f900faa1065d2d9b322a28310266d7a72820e8a01f32af1eeaeddaf08199a4e3fdd

Score
10/10

Malware Config

Targets

    • Target

      034bbc6af2aa726b3e31735e52ec1617bfca41cd5257f5e857f95e18772e437f

    • Size

      2.2MB

    • MD5

      05d8d3620c53301291b61d802aa47582

    • SHA1

      7c2d35f50662afb44baee66361c1c1d552808952

    • SHA256

      034bbc6af2aa726b3e31735e52ec1617bfca41cd5257f5e857f95e18772e437f

    • SHA512

      f996ad0c3c0eee160c4a073c3caa230ec92b4af000a3bfe7632fbcd6c8df2f900faa1065d2d9b322a28310266d7a72820e8a01f32af1eeaeddaf08199a4e3fdd

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks