General

  • Target

    028db9d7f9f1f5d08cfc7c59000362bf802e29359a97b328f906452d1148fd3b

  • Size

    1.9MB

  • Sample

    220516-pxs38sedfq

  • MD5

    14e4428b2de5dbeb1f4e0edaeefc1674

  • SHA1

    e7d1f8f90bfd5e4ecc67dd454fc724d43dc09e6d

  • SHA256

    028db9d7f9f1f5d08cfc7c59000362bf802e29359a97b328f906452d1148fd3b

  • SHA512

    593eb2bef41c7404541f44c75e1ef5fca7bd414206f699dacc698dade50c3f1be0be8f03569c2d8e08292c778b5a9f437a75dd674387aa24689d89020e61c211

Score
10/10

Malware Config

Targets

    • Target

      028db9d7f9f1f5d08cfc7c59000362bf802e29359a97b328f906452d1148fd3b

    • Size

      1.9MB

    • MD5

      14e4428b2de5dbeb1f4e0edaeefc1674

    • SHA1

      e7d1f8f90bfd5e4ecc67dd454fc724d43dc09e6d

    • SHA256

      028db9d7f9f1f5d08cfc7c59000362bf802e29359a97b328f906452d1148fd3b

    • SHA512

      593eb2bef41c7404541f44c75e1ef5fca7bd414206f699dacc698dade50c3f1be0be8f03569c2d8e08292c778b5a9f437a75dd674387aa24689d89020e61c211

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks