General

  • Target

    545b7b511139c9e320c3a2f127c1710477a0873897123dd71ccbf5e4921b6110

  • Size

    2.9MB

  • Sample

    240520-2fvlysae2z

  • MD5

    8e6a996301bd882ba0055ce3b051497e

  • SHA1

    15326991b9035e4492d2c2ff1f4fd67ec4b50594

  • SHA256

    545b7b511139c9e320c3a2f127c1710477a0873897123dd71ccbf5e4921b6110

  • SHA512

    2cc492ce47a6394ede892bc272a24d39fe080d523e137f505ea275154a7b85ced77ba4eeab76f2b7b3e06b49e28efaa67e1b7f725064b62daf08ec5391d02ec4

  • SSDEEP

    49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMki8CnfLv3zQXtTu:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R1

Malware Config

Targets

    • Target

      545b7b511139c9e320c3a2f127c1710477a0873897123dd71ccbf5e4921b6110

    • Size

      2.9MB

    • MD5

      8e6a996301bd882ba0055ce3b051497e

    • SHA1

      15326991b9035e4492d2c2ff1f4fd67ec4b50594

    • SHA256

      545b7b511139c9e320c3a2f127c1710477a0873897123dd71ccbf5e4921b6110

    • SHA512

      2cc492ce47a6394ede892bc272a24d39fe080d523e137f505ea275154a7b85ced77ba4eeab76f2b7b3e06b49e28efaa67e1b7f725064b62daf08ec5391d02ec4

    • SSDEEP

      49152:S1G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMki8CnfLv3zQXtTu:S1ONtyBeSFkXV1etEKLlWUTOfeiRA2R1

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks