General

  • Target

    45d584834f8b78434efee0a0480aad859cf110e05cd5323753cc1d96db5dd515

  • Size

    5.1MB

  • Sample

    220701-f6knsadhhl

  • MD5

    365568e365b8c72be3cc954c6284a7ec

  • SHA1

    a2606bdbd7aa3bf7b2a39aa0b627fd5f2bf9c536

  • SHA256

    45d584834f8b78434efee0a0480aad859cf110e05cd5323753cc1d96db5dd515

  • SHA512

    3ff274f3db5c7f5ec46c602318d795aafcd0b7eb05dfe5f57468fc8a937c292370a2e6a93ff65fd183fc8fe3c310a5e5be7e599eb6df670a06d51e6569fc0d29

Malware Config

Targets

    • Target

      45d584834f8b78434efee0a0480aad859cf110e05cd5323753cc1d96db5dd515

    • Size

      5.1MB

    • MD5

      365568e365b8c72be3cc954c6284a7ec

    • SHA1

      a2606bdbd7aa3bf7b2a39aa0b627fd5f2bf9c536

    • SHA256

      45d584834f8b78434efee0a0480aad859cf110e05cd5323753cc1d96db5dd515

    • SHA512

      3ff274f3db5c7f5ec46c602318d795aafcd0b7eb05dfe5f57468fc8a937c292370a2e6a93ff65fd183fc8fe3c310a5e5be7e599eb6df670a06d51e6569fc0d29

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner Payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks