General

  • Target

    d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e

  • Size

    10.2MB

  • Sample

    220630-ynrngsced4

  • MD5

    f29a86fa16fc8c55acbfabe4fb388743

  • SHA1

    e0e74d9f4454df636fd2fec10561af4fd5412353

  • SHA256

    d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e

  • SHA512

    8e419c8ab1586151fa174e65e2b2505a499ab24a303a655d900619ebaaa24528f058409e04961b6bde2d8c131155f28c3d885fe46a148726467408475b806ebb

Malware Config

Targets

    • Target

      d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e

    • Size

      10.2MB

    • MD5

      f29a86fa16fc8c55acbfabe4fb388743

    • SHA1

      e0e74d9f4454df636fd2fec10561af4fd5412353

    • SHA256

      d60931ac230ffd0dca4f8e372fb3c82716a3f71fe7c199b4c6a517aafc55305e

    • SHA512

      8e419c8ab1586151fa174e65e2b2505a499ab24a303a655d900619ebaaa24528f058409e04961b6bde2d8c131155f28c3d885fe46a148726467408475b806ebb

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner Payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks