General

  • Target

    000799907bbeacf6e5c43aabf4fc055d7b0b4379122da2cb3f1f0418c0df65f8

  • Size

    2.0MB

  • Sample

    220516-pyb64sedhm

  • MD5

    053ced2b9ee84c9fc902e46354c3e436

  • SHA1

    bfd5084045a0152a16e2512284feb37943c8b8e8

  • SHA256

    000799907bbeacf6e5c43aabf4fc055d7b0b4379122da2cb3f1f0418c0df65f8

  • SHA512

    6ef6cf4faeb079f92412502e7f76dca1ffcb158e456354b48076b58bb313ea6fa53af02591aaa7424c8f6418f0d1d5a95e30f6254defd6a321e9f43727ff752c

Score
10/10

Malware Config

Targets

    • Target

      000799907bbeacf6e5c43aabf4fc055d7b0b4379122da2cb3f1f0418c0df65f8

    • Size

      2.0MB

    • MD5

      053ced2b9ee84c9fc902e46354c3e436

    • SHA1

      bfd5084045a0152a16e2512284feb37943c8b8e8

    • SHA256

      000799907bbeacf6e5c43aabf4fc055d7b0b4379122da2cb3f1f0418c0df65f8

    • SHA512

      6ef6cf4faeb079f92412502e7f76dca1ffcb158e456354b48076b58bb313ea6fa53af02591aaa7424c8f6418f0d1d5a95e30f6254defd6a321e9f43727ff752c

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Command and Control

Web Service

1
T1102

Tasks