General

  • Target

    024933e3426213f97e86dc40771bb80d93e07e988e645def66f8b3302910da69

  • Size

    1.5MB

  • Sample

    220516-pxvbasedfr

  • MD5

    0e40ac055cd3b305281151b24115154f

  • SHA1

    00b62eb119bfb183ec6e1c2d1a9dfb11ca1f5e6e

  • SHA256

    024933e3426213f97e86dc40771bb80d93e07e988e645def66f8b3302910da69

  • SHA512

    172e45f4be14f9bfe4330c12794b840f62d0d2b006d93d41fd51a717b6ddec06da997726335d4bd586612596e6759e3d2dcc94209680a0a5d82df316d7db6a19

Score
10/10

Malware Config

Targets

    • Target

      024933e3426213f97e86dc40771bb80d93e07e988e645def66f8b3302910da69

    • Size

      1.5MB

    • MD5

      0e40ac055cd3b305281151b24115154f

    • SHA1

      00b62eb119bfb183ec6e1c2d1a9dfb11ca1f5e6e

    • SHA256

      024933e3426213f97e86dc40771bb80d93e07e988e645def66f8b3302910da69

    • SHA512

      172e45f4be14f9bfe4330c12794b840f62d0d2b006d93d41fd51a717b6ddec06da997726335d4bd586612596e6759e3d2dcc94209680a0a5d82df316d7db6a19

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks