General

  • Target

    9a24a00438a4d06d64fe4820061a1b45.bin

  • Size

    38KB

  • Sample

    240519-bqd4vaba33

  • MD5

    ce0f11bb698299f268d12b1dc9511bbf

  • SHA1

    1f0c7a4908a05715df702fd2cb5854f2900993d8

  • SHA256

    b9f74b04110db1db0d73ec1c96ce7c274a2b8d83326cf2d85175047c3e5717eb

  • SHA512

    570331498099f17f5697cf058a980285a860e29c948d2fe6205efab72d9b832340d04c675e62c8d4acd85e30862112c0341cfcdda5b64a3a0571de899b0d0917

  • SSDEEP

    768:uaT+BdlEGH87bjUuY4FnFU8eTGlbZ9nqL0qf95k0mss6Eia:9SdF8bjUQLVeSi0I5OD5

Malware Config

Targets

    • Target

      66944b456b33438cbf93d112d973112903f57dc16bf4c069e968562fa8f01b54.exe

    • Size

      104KB

    • MD5

      9a24a00438a4d06d64fe4820061a1b45

    • SHA1

      6e59989652dff276a6dfa0f287b6c468a2f04842

    • SHA256

      66944b456b33438cbf93d112d973112903f57dc16bf4c069e968562fa8f01b54

    • SHA512

      80e97c8c389554ba0512b7f496dd03e82f2a627568eca631a6393033d540a70779fc7eae2485d1b9ca3657beb8ae9a86fd08ecd5dba678407bf8e63bef9a4629

    • SSDEEP

      1536:KlULHCIFmav82fkJMTZ0imzS6ussgExLXCxnbKG:wUDeO9TZH6SngYsbKG

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks