General

  • Target

    autoc3pool.bat

  • Size

    5KB

  • Sample

    230607-ttgcgscg34

  • MD5

    d28070074dab9fa5aceddb39ca45dc5d

  • SHA1

    e268ed454e42a4286fbef29a41a368f3183c6a3e

  • SHA256

    7a5c1b3504f8b7cc3807b63489be9f3c5629600f507f7ba2073ccf9cb93aa4d8

  • SHA512

    b1f941a0af376483bea4c48e1ae6e7fac055d83873974de83f704dfabade5749d43082f013dd41eb1fab5b6cdc3ff483b52e6c93757925e82532e44d0883062f

  • SSDEEP

    96:EAcjtsHKVDoHJyH+vHEdXGWcL+mKMVFLQqIr0yJ43T+Q3oUIg1RWS2QvSJFcHbTO:EVaqpopyevkhP6+mKoQfgO43V3odg1R+

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://c3poolbat.oss-accelerate.aliyuncs.com/c3pool/WinRing0x64.sys

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://c3poolbat.oss-accelerate.aliyuncs.com/c3pool/config.json

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://c3poolbat.oss-accelerate.aliyuncs.com/c3pool/xmrig.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://c3poolbat.oss-accelerate.aliyuncs.com/c3pool/nssm.exe

Targets

    • Target

      autoc3pool.bat

    • Size

      5KB

    • MD5

      d28070074dab9fa5aceddb39ca45dc5d

    • SHA1

      e268ed454e42a4286fbef29a41a368f3183c6a3e

    • SHA256

      7a5c1b3504f8b7cc3807b63489be9f3c5629600f507f7ba2073ccf9cb93aa4d8

    • SHA512

      b1f941a0af376483bea4c48e1ae6e7fac055d83873974de83f704dfabade5749d43082f013dd41eb1fab5b6cdc3ff483b52e6c93757925e82532e44d0883062f

    • SSDEEP

      96:EAcjtsHKVDoHJyH+vHEdXGWcL+mKMVFLQqIr0yJ43T+Q3oUIg1RWS2QvSJFcHbTO:EVaqpopyevkhP6+mKoQfgO43V3odg1R+

    Score
    10/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Process Discovery

1
T1057

Tasks