General

  • Target

    4569d73b5a84be843dbb90e805ff5e3899e2a187b7cd0df5a7500a8af0fed58b

  • Size

    2.3MB

  • Sample

    240308-xpgn8seh4t

  • MD5

    ca97fca28e57b295d293e1ac2757387a

  • SHA1

    834b9db28b75844c56e5f978fddcda39052e4275

  • SHA256

    4569d73b5a84be843dbb90e805ff5e3899e2a187b7cd0df5a7500a8af0fed58b

  • SHA512

    6a7add852ef1df2851999acd143f436963de3513a3aea721b4dc6c69f33ef90d197d780df1f8a1e2b5e5a09c7bab95ea1cc436507e7d27c63f492e14f5a47665

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1VQx7Va4qrjg:NABV

Score
10/10

Malware Config

Targets

    • Target

      4569d73b5a84be843dbb90e805ff5e3899e2a187b7cd0df5a7500a8af0fed58b

    • Size

      2.3MB

    • MD5

      ca97fca28e57b295d293e1ac2757387a

    • SHA1

      834b9db28b75844c56e5f978fddcda39052e4275

    • SHA256

      4569d73b5a84be843dbb90e805ff5e3899e2a187b7cd0df5a7500a8af0fed58b

    • SHA512

      6a7add852ef1df2851999acd143f436963de3513a3aea721b4dc6c69f33ef90d197d780df1f8a1e2b5e5a09c7bab95ea1cc436507e7d27c63f492e14f5a47665

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1VQx7Va4qrjg:NABV

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks