General

  • Target

    5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482

  • Size

    19.2MB

  • Sample

    220521-azsg6abag5

  • MD5

    19263218df8fc863e249a5300abd8856

  • SHA1

    0775d23e9c3aca70961fe1498735c650f441c5df

  • SHA256

    5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482

  • SHA512

    cc793a66cf206bf8e48a55e0c84dfc361d44896b5a69534d27b9376bd7d7be59067a667e5077fbea48f40c7841994c57e1bcdfabe14c42d4a59271a9ea4b44a9

Malware Config

Targets

    • Target

      5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482

    • Size

      19.2MB

    • MD5

      19263218df8fc863e249a5300abd8856

    • SHA1

      0775d23e9c3aca70961fe1498735c650f441c5df

    • SHA256

      5750a4e7e392665b01ccfdd4af273ccbe096b14516c7a3e0f2fbb068ad25e482

    • SHA512

      cc793a66cf206bf8e48a55e0c84dfc361d44896b5a69534d27b9376bd7d7be59067a667e5077fbea48f40c7841994c57e1bcdfabe14c42d4a59271a9ea4b44a9

    • Modifies visibility of file extensions in Explorer

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks