General

  • Target

    1371bd479a8c64088b87d1a3439899bfaa2a98ffbefbcda9e9d3a6b7ba04702d

  • Size

    5.1MB

  • Sample

    230207-khl9xsae49

  • MD5

    f705b8fcd18c72c83bfa1b1a44bc0a41

  • SHA1

    542dbd21cbd8e15a7c4f9289b3ac103a4cb97dd4

  • SHA256

    1371bd479a8c64088b87d1a3439899bfaa2a98ffbefbcda9e9d3a6b7ba04702d

  • SHA512

    e513e085998c94d84cde937adea4d6fda5e31ee906be4c7c95d54431295e6881d8a6df5d386dd6eb6b0c9083ac0090ae8ba3d880a31cca5fda62e206401f8922

  • SSDEEP

    98304:akU5/SU9MIYjw6FxzchqSQvN7pkCF4ks+vX65otrpCpXtrdHtC6M2XX:05/SU9MNFxzcwznkSaiGodcpXdsoX

Malware Config

Targets

    • Target

      1371bd479a8c64088b87d1a3439899bfaa2a98ffbefbcda9e9d3a6b7ba04702d

    • Size

      5.1MB

    • MD5

      f705b8fcd18c72c83bfa1b1a44bc0a41

    • SHA1

      542dbd21cbd8e15a7c4f9289b3ac103a4cb97dd4

    • SHA256

      1371bd479a8c64088b87d1a3439899bfaa2a98ffbefbcda9e9d3a6b7ba04702d

    • SHA512

      e513e085998c94d84cde937adea4d6fda5e31ee906be4c7c95d54431295e6881d8a6df5d386dd6eb6b0c9083ac0090ae8ba3d880a31cca5fda62e206401f8922

    • SSDEEP

      98304:akU5/SU9MIYjw6FxzchqSQvN7pkCF4ks+vX65otrpCpXtrdHtC6M2XX:05/SU9MNFxzcwznkSaiGodcpXdsoX

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • XMRig Miner payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks