General

  • Target

    e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e

  • Size

    987KB

  • Sample

    230508-3qbghafb8v

  • MD5

    f69660e01c5042b49fc54d40dbe5ed85

  • SHA1

    90a201a5c46cb0836078c4decac08b1d2fdf946a

  • SHA256

    e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e

  • SHA512

    b5230e013371304312576c749254d580b52b2457ffefd125a0562199a18872490c4a6a8d430659db9be40ba4e645870ae83a48a39d36a0ea58496f1b84b31238

  • SSDEEP

    12288:lToPWBv/cpGrU3y4CDk2VCJl5stacV9u9QDCNy+scbYVlpwUnqSaqJVt2eEkcVw0:lTbBv5rUqDC3YmJYVwYIqcRyw

Malware Config

Extracted

Family

eternity

Wallets

48zNQwXLksrS7S3ohbWAKRTYWu5htM4FG4sa9iz6LzgWj6ebFQzyJe9aWJbw4nsHR7KQyDrXKG6bxKQTJdj9Uhu138L9FDz

Attributes
  • payload_urls

    http://81.161.229.110:8080/upload/xmrig.exe

Targets

    • Target

      e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e

    • Size

      987KB

    • MD5

      f69660e01c5042b49fc54d40dbe5ed85

    • SHA1

      90a201a5c46cb0836078c4decac08b1d2fdf946a

    • SHA256

      e4dd163e969aa6a51bf446a2e7b1f083ba79883e600516932eccba94e275a47e

    • SHA512

      b5230e013371304312576c749254d580b52b2457ffefd125a0562199a18872490c4a6a8d430659db9be40ba4e645870ae83a48a39d36a0ea58496f1b84b31238

    • SSDEEP

      12288:lToPWBv/cpGrU3y4CDk2VCJl5stacV9u9QDCNy+scbYVlpwUnqSaqJVt2eEkcVw0:lTbBv5rUqDC3YmJYVwYIqcRyw

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • XMRig Miner payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks