General

  • Target

    13d6361137c3e50b65f6e7385e44e2a5bbcb435aea861112953579ec2230fd44

  • Size

    3.9MB

  • Sample

    230331-axxn4ahc9w

  • MD5

    a04a12bd76283170bc83848686e4f946

  • SHA1

    b41559f22d841698f1c140052273b1254a2b8b4e

  • SHA256

    13d6361137c3e50b65f6e7385e44e2a5bbcb435aea861112953579ec2230fd44

  • SHA512

    b094a4c6cbccb291d9d7f6317381096b37a67771b051f092b0d2436b4e3a468f1ef437f99a88dc66d026d498174e31065f4780fff1f9cbd306d629c1e2b55ab5

  • SSDEEP

    98304:vT72zCNeI+sjbIBNmJ1t2WJ8BJXzN9Bhvu4:vPb+sjbIXgUJXzN9Bhvu4

Score
10/10

Malware Config

Targets

    • Target

      13d6361137c3e50b65f6e7385e44e2a5bbcb435aea861112953579ec2230fd44

    • Size

      3.9MB

    • MD5

      a04a12bd76283170bc83848686e4f946

    • SHA1

      b41559f22d841698f1c140052273b1254a2b8b4e

    • SHA256

      13d6361137c3e50b65f6e7385e44e2a5bbcb435aea861112953579ec2230fd44

    • SHA512

      b094a4c6cbccb291d9d7f6317381096b37a67771b051f092b0d2436b4e3a468f1ef437f99a88dc66d026d498174e31065f4780fff1f9cbd306d629c1e2b55ab5

    • SSDEEP

      98304:vT72zCNeI+sjbIBNmJ1t2WJ8BJXzN9Bhvu4:vPb+sjbIXgUJXzN9Bhvu4

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks