General

  • Target

    Loader.exe

  • Size

    5.0MB

  • Sample

    220814-dn17pshbfn

  • MD5

    99cb59399f9bf0a8a656979a082e0f76

  • SHA1

    050eb916467e1d056792bcd5173b0322c843a234

  • SHA256

    790fd3d09fa9f0249961434cfcad34cd9cef2725d141700151b679831cfb9ee6

  • SHA512

    33bbb570f10b15c43ff3af6c946fa8079f54454360f5e004903a4ecbfe5439e93e3f2d1c599f580a01bb7e36268607a6d5bdc662df29b432299b8b934be2530c

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      5.0MB

    • MD5

      99cb59399f9bf0a8a656979a082e0f76

    • SHA1

      050eb916467e1d056792bcd5173b0322c843a234

    • SHA256

      790fd3d09fa9f0249961434cfcad34cd9cef2725d141700151b679831cfb9ee6

    • SHA512

      33bbb570f10b15c43ff3af6c946fa8079f54454360f5e004903a4ecbfe5439e93e3f2d1c599f580a01bb7e36268607a6d5bdc662df29b432299b8b934be2530c

    • Modifies security service

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Modifies file permissions

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks