General

  • Target

    16ad4d43b7af293cf043eaea47f1e539

  • Size

    3.9MB

  • Sample

    231230-m5ppnsgcb2

  • MD5

    16ad4d43b7af293cf043eaea47f1e539

  • SHA1

    4ee4032e211c3a73e1f51d413aaec227330b75af

  • SHA256

    84984691eaaa25532f248628b4b32d6b3e2927bb84e7f42155ffe5f7abfbd75e

  • SHA512

    06fd8205c8943056a327df5096134a245741118a3d6bf791ee35142cc7f3744809051803279544c84e776934e27379715cd204658d1eb174bb02e43d866954d4

  • SSDEEP

    49152:NJ3eK3E7NSpHceAcmlcURiy8rfnptKNhi:n3Ekocm668fCNs

Score
10/10

Malware Config

Targets

    • Target

      16ad4d43b7af293cf043eaea47f1e539

    • Size

      3.9MB

    • MD5

      16ad4d43b7af293cf043eaea47f1e539

    • SHA1

      4ee4032e211c3a73e1f51d413aaec227330b75af

    • SHA256

      84984691eaaa25532f248628b4b32d6b3e2927bb84e7f42155ffe5f7abfbd75e

    • SHA512

      06fd8205c8943056a327df5096134a245741118a3d6bf791ee35142cc7f3744809051803279544c84e776934e27379715cd204658d1eb174bb02e43d866954d4

    • SSDEEP

      49152:NJ3eK3E7NSpHceAcmlcURiy8rfnptKNhi:n3Ekocm668fCNs

    Score
    10/10
    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks