General
-
Target
get.png
-
Size
8KB
-
Sample
240328-kpsqaagf7x
-
MD5
ae465af2287d24ccdeec8035a1e3f159
-
SHA1
e32c4c6c0a46e409cb81a28fe1aefc2e1aae569b
-
SHA256
c0fe0c93b610f4e952a51febb4d1473ca9b164250cb6b94b3a360a7c39a7b66e
-
SHA512
431361d8db7b27cbe22f56379ac6e68c54161bdb4702359ed927f9bb144c1f160688165805d3872044bf884fd66467f2c9da0b048a377d3b50010fcff5104be6
-
SSDEEP
192:Gswo+GbNlXOxscP5FTHkcJqYfZ13JkIL1SgQ4iPYyoc:Rh+qLOxFxicYIZ13KIU/dPYyj
Static task
static1
Behavioral task
behavioral1
Sample
get.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
get.ps1
Resource
win10v2004-20231215-en
Malware Config
Extracted
http://downloadAddress/config.txt
http://downloadAddress/curl.png
http://downloadAddress/kill.png
http://downloadAddress/smartsscreen.png
http://downloadAddress/get.png
http://downloadAddress/msdtc/86.png
http://downloadAddress/msdtc/64.png
http://downloadAddress/drives/kill.png
http://downloadAddress/drives/delete.png
http://111.90.158.40/backup.png
Extracted
http://111.90.158.40/kill.png?random=20240328084732
Extracted
http://111.90.158.40/kill.png?random=20240328084716
Extracted
http://111.90.158.40/get.png?random=1711615656
Extracted
http://111.90.158.40/kill.png?random=20240328084740
Targets
-
-
Target
get.png
-
Size
8KB
-
MD5
ae465af2287d24ccdeec8035a1e3f159
-
SHA1
e32c4c6c0a46e409cb81a28fe1aefc2e1aae569b
-
SHA256
c0fe0c93b610f4e952a51febb4d1473ca9b164250cb6b94b3a360a7c39a7b66e
-
SHA512
431361d8db7b27cbe22f56379ac6e68c54161bdb4702359ed927f9bb144c1f160688165805d3872044bf884fd66467f2c9da0b048a377d3b50010fcff5104be6
-
SSDEEP
192:Gswo+GbNlXOxscP5FTHkcJqYfZ13JkIL1SgQ4iPYyoc:Rh+qLOxFxicYIZ13KIU/dPYyj
Score10/10-
XMRig Miner payload
-
Clears Windows event logs
-
Blocklisted process makes network request
-
Creates new service(s)
-
Drops file in Drivers directory
-
Stops running service(s)
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1