General

  • Target

    1fe6a553c5fec590442fd8d73ca2b4ec7197d1f991815ca4b2de32f2c551a55b

  • Size

    2.7MB

  • Sample

    240509-xy3ytsde99

  • MD5

    2a00bf404a5d2ab5ae822b8cb661a98f

  • SHA1

    47c63b457b32a79c099924eac2fa719f3006e4d5

  • SHA256

    1fe6a553c5fec590442fd8d73ca2b4ec7197d1f991815ca4b2de32f2c551a55b

  • SHA512

    b90a2df65df54f2e72cd21c80bb1dd2bb8624dd7b4405456cf968b2d0b20e15be75d2a8cf041a02bc2f008d12d4d0d2ca3298703cb650edf323db814a32e797d

  • SSDEEP

    49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hjGhql0lQGQBC385o:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R7

Malware Config

Targets

    • Target

      1fe6a553c5fec590442fd8d73ca2b4ec7197d1f991815ca4b2de32f2c551a55b

    • Size

      2.7MB

    • MD5

      2a00bf404a5d2ab5ae822b8cb661a98f

    • SHA1

      47c63b457b32a79c099924eac2fa719f3006e4d5

    • SHA256

      1fe6a553c5fec590442fd8d73ca2b4ec7197d1f991815ca4b2de32f2c551a55b

    • SHA512

      b90a2df65df54f2e72cd21c80bb1dd2bb8624dd7b4405456cf968b2d0b20e15be75d2a8cf041a02bc2f008d12d4d0d2ca3298703cb650edf323db814a32e797d

    • SSDEEP

      49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hjGhql0lQGQBC385o:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R7

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks