General

  • Target

    mamamiya137_ru_.bin.dll

  • Size

    2.7MB

  • Sample

    220908-3xahsagbe4

  • MD5

    36c48ba4f231388a5f08fae2df0cec58

  • SHA1

    3ba1d0aac10a41519610cf9166ab39b4c092d431

  • SHA256

    fc33ed2f28a10b4b3cb775f7e699295f604d28bf3bf2cb2bc9185d002f89f91c

  • SHA512

    4aa0e73f4eebfeb6cdeaf7cb0d050355185d3b8d91c044a911f895ec614ff0cb8b6d8e89ce3ea73052a4b55444ef1c7f72eaeabf2946a6bee8383ad03d93d4ee

  • SSDEEP

    49152:Jzl1rpbUrqvv0v2rQVt8nqwI7lOOYc92ek:P1Kqvv07noI7lOOYcX

Malware Config

Targets

    • Target

      mamamiya137_ru_.bin.dll

    • Size

      2.7MB

    • MD5

      36c48ba4f231388a5f08fae2df0cec58

    • SHA1

      3ba1d0aac10a41519610cf9166ab39b4c092d431

    • SHA256

      fc33ed2f28a10b4b3cb775f7e699295f604d28bf3bf2cb2bc9185d002f89f91c

    • SHA512

      4aa0e73f4eebfeb6cdeaf7cb0d050355185d3b8d91c044a911f895ec614ff0cb8b6d8e89ce3ea73052a4b55444ef1c7f72eaeabf2946a6bee8383ad03d93d4ee

    • SSDEEP

      49152:Jzl1rpbUrqvv0v2rQVt8nqwI7lOOYc92ek:P1Kqvv07noI7lOOYcX

    • Modifies security service

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks