General

  • Target

    d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9

  • Size

    251KB

  • Sample

    220704-rp5s6shgfn

  • MD5

    fd2077eeebc5c2187791ce8a89c7ed0b

  • SHA1

    2fb1a3902a00ce29a1693c1ca460e78c8739c33f

  • SHA256

    d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9

  • SHA512

    09895a250972f2ff3edde210a301e221e2705bd241012b2ad1e0e395e4935f2ef280b60c325b28080920738d2314a8ae5a873bbf7377736e770d1e44a3b844ed

Score
10/10

Malware Config

Targets

    • Target

      d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9

    • Size

      251KB

    • MD5

      fd2077eeebc5c2187791ce8a89c7ed0b

    • SHA1

      2fb1a3902a00ce29a1693c1ca460e78c8739c33f

    • SHA256

      d49b935c0111e2a4bfb079159c7bfa9ce1444aa6aff65fe2ba01601060707ad9

    • SHA512

      09895a250972f2ff3edde210a301e221e2705bd241012b2ad1e0e395e4935f2ef280b60c325b28080920738d2314a8ae5a873bbf7377736e770d1e44a3b844ed

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner Payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks