General

  • Target

    573b987e635f535bbd97e9e6c9f65ed993af8a32ede1317d11bc6bc4ff406d3f.exe

  • Size

    6.6MB

  • Sample

    231101-rwvlsabf24

  • MD5

    a860142665556db513b8afd0c07e2e7d

  • SHA1

    4b98fbaf17ffb69c91a1858a39bb9971ee05f114

  • SHA256

    573b987e635f535bbd97e9e6c9f65ed993af8a32ede1317d11bc6bc4ff406d3f

  • SHA512

    ae3d2ebbd7196b28c8bcad0f353e02f0b6e1312482b391e775ae872697217bbc2413fb79d4b99c3f47db8c9815970f95f23377a604777d5dc0298ead0f254f31

  • SSDEEP

    196608:eAqjTpnhXlmyWCZNulPKQ8hY/Bkr/fOIT/+VdlBFKaz9:kfauN/HYOSIT/EVF9p

Malware Config

Targets

    • Target

      573b987e635f535bbd97e9e6c9f65ed993af8a32ede1317d11bc6bc4ff406d3f.exe

    • Size

      6.6MB

    • MD5

      a860142665556db513b8afd0c07e2e7d

    • SHA1

      4b98fbaf17ffb69c91a1858a39bb9971ee05f114

    • SHA256

      573b987e635f535bbd97e9e6c9f65ed993af8a32ede1317d11bc6bc4ff406d3f

    • SHA512

      ae3d2ebbd7196b28c8bcad0f353e02f0b6e1312482b391e775ae872697217bbc2413fb79d4b99c3f47db8c9815970f95f23377a604777d5dc0298ead0f254f31

    • SSDEEP

      196608:eAqjTpnhXlmyWCZNulPKQ8hY/Bkr/fOIT/+VdlBFKaz9:kfauN/HYOSIT/EVF9p

    • Beapy

      Beapy is a python worm with crypto mining capabilities.

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Contacts a large (7876) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • mimikatz is an open source tool to dump credentials on Windows

    • Contacts a large (525) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Modifies Windows Firewall

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Command and Scripting Interpreter

1
T1059

Persistence

Account Manipulation

1
T1098

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Discovery

Network Service Discovery

3
T1046

System Information Discovery

2
T1082

Tasks