General

  • Target

    get.png

  • Size

    8KB

  • Sample

    240328-kpsqaagf7x

  • MD5

    ae465af2287d24ccdeec8035a1e3f159

  • SHA1

    e32c4c6c0a46e409cb81a28fe1aefc2e1aae569b

  • SHA256

    c0fe0c93b610f4e952a51febb4d1473ca9b164250cb6b94b3a360a7c39a7b66e

  • SHA512

    431361d8db7b27cbe22f56379ac6e68c54161bdb4702359ed927f9bb144c1f160688165805d3872044bf884fd66467f2c9da0b048a377d3b50010fcff5104be6

  • SSDEEP

    192:Gswo+GbNlXOxscP5FTHkcJqYfZ13JkIL1SgQ4iPYyoc:Rh+qLOxFxicYIZ13KIU/dPYyj

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://downloadAddress/config.txt

exe.dropper

http://downloadAddress/curl.png

exe.dropper

http://downloadAddress/kill.png

exe.dropper

http://downloadAddress/smartsscreen.png

exe.dropper

http://downloadAddress/get.png

exe.dropper

http://downloadAddress/msdtc/86.png

exe.dropper

http://downloadAddress/msdtc/64.png

exe.dropper

http://downloadAddress/drives/kill.png

exe.dropper

http://downloadAddress/drives/delete.png

exe.dropper

http://111.90.158.40/backup.png

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://111.90.158.40/kill.png?random=20240328084732

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://111.90.158.40/kill.png?random=20240328084716

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://111.90.158.40/get.png?random=1711615656

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://111.90.158.40/kill.png?random=20240328084740

Targets

    • Target

      get.png

    • Size

      8KB

    • MD5

      ae465af2287d24ccdeec8035a1e3f159

    • SHA1

      e32c4c6c0a46e409cb81a28fe1aefc2e1aae569b

    • SHA256

      c0fe0c93b610f4e952a51febb4d1473ca9b164250cb6b94b3a360a7c39a7b66e

    • SHA512

      431361d8db7b27cbe22f56379ac6e68c54161bdb4702359ed927f9bb144c1f160688165805d3872044bf884fd66467f2c9da0b048a377d3b50010fcff5104be6

    • SSDEEP

      192:Gswo+GbNlXOxscP5FTHkcJqYfZ13JkIL1SgQ4iPYyoc:Rh+qLOxFxicYIZ13KIU/dPYyj

    • Modifies Windows Defender Real-time Protection settings

    • XMRig Miner payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Clears Windows event logs

    • Blocklisted process makes network request

    • Creates new service(s)

    • Drops file in Drivers directory

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

3
T1543

Windows Service

3
T1543.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

3
T1543

Windows Service

3
T1543.003

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Indicator Removal

1
T1070

Discovery

Query Registry

1
T1012

Impact

Service Stop

1
T1489

Tasks