Resubmissions

07-09-2023 19:17

230907-xzr8qadd57 10

28-08-2023 15:19

230828-sqlmcsca84 10

26-08-2023 15:20

230826-sqx1dsdd2t 10

20-08-2023 00:22

230820-an3hzscg53 10

General

  • Target

    KPehvv7c439w9MBh.zip

  • Size

    23.7MB

  • Sample

    230907-xzr8qadd57

  • MD5

    ce8c3a19c02171ee08102ad4551e8b6c

  • SHA1

    6ca8b13fe4d67d315aa478183847c89597470b1d

  • SHA256

    118a83cef7804742f9bc8f11c9deea34b84c35d65edca3036667edbd02dc7df8

  • SHA512

    8ec7e27b75afaea43bffba6e7dc86ded309e9fd96a5a1b94d14e7f698e014e34ec856914454e212ec203c19c2671b1465d896659e988cb80a769627e16ea1804

  • SSDEEP

    393216:LBuZ61iW8XBuZ61iW87BuZ61iW8bBuZ61iW8iBuZ61iW8tBuZ61iW8HBuZ61iW8b:L8wC8w+8wG8wX8wc8wy8wj8wX8wC8wNj

Score
10/10

Malware Config

Targets

    • Target

      QNREJhVYDhHk52cq3.exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      RmJBfzgfbWELMdgn.exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      TTVw7dDmSpz5mwee.exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e (16).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e (19).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e (4).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e(13).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e(14).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e(15).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e(17).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e(18).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      qM5GMXBk6hJE6Y5e(6).exe

    • Size

      2.0MB

    • MD5

      a16a669a09bf158058b83e04e69fe38e

    • SHA1

      f6c94763850d9e590d86057139e8895a7aacdeea

    • SHA256

      cacc0261ccf7578ef5c1f9fdbe35705ad91070d020a4225e05cbf71a6103ac8e

    • SHA512

      658b52ad1d27becee5b5bbd443d43da38b88d49880e72c8cb843f176a2d84d571b39c34dbc7cfb7ea56acc548acc5b68cce47a8bcf9d173feec031f7e33a09c6

    • SSDEEP

      49152:rWVipAxqo5p88CbXuxWQiSJU320ZW21Q0YWAij64ane6szjmL/45:rxAEcp9ueXit9WAQ0YWuO

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

xmrigminerupx
Score
10/10

behavioral2

xmrigminerupx
Score
10/10

behavioral3

xmrigminerupx
Score
10/10

behavioral4

xmrigminerupx
Score
10/10

behavioral5

xmrigminerupx
Score
10/10

behavioral6

xmrigminerupx
Score
10/10

behavioral7

xmrigminerupx
Score
10/10

behavioral8

xmrigminerupx
Score
10/10

behavioral9

xmrigminerupx
Score
10/10

behavioral10

xmrigminerupx
Score
10/10

behavioral11

xmrigminerupx
Score
10/10

behavioral12

xmrigminerupx
Score
10/10

behavioral13

xmrigminerupx
Score
10/10

behavioral14

xmrigminerupx
Score
10/10

behavioral15

xmrigminerupx
Score
10/10

behavioral16

xmrigminerupx
Score
10/10

behavioral17

xmrigminerupx
Score
10/10

behavioral18

xmrigminerupx
Score
10/10

behavioral19

Score
1/10

behavioral20

xmrigminerupx
Score
10/10

behavioral21

xmrigminerupx
Score
10/10

behavioral22

xmrigminerupx
Score
10/10

behavioral23

xmrigminerupx
Score
10/10

behavioral24

xmrigminerupx
Score
10/10