General

  • Target

    hurtownia2018full.sql

  • Size

    11KB

  • Sample

    240522-p8aq2acc7z

  • MD5

    f659bce6e2dd947f04eb35dcb0ad9fbd

  • SHA1

    f8b5aaabcb81313af8346e1c2a6971ce968170e7

  • SHA256

    eea3daa9f4c7ce4a1c649661a973c663daa6d8b82fc95521ad5264a2ff05a475

  • SHA512

    7efab4fb1b2fa1be428ed89482952a34203782d7537b8bf50950b74f2ba00d98682a79b1f8a3e1ba583601c85c1711da1aa0f4d4bd06cc1ff9d5ad0e2b86d2a2

  • SSDEEP

    192:wQyWu6PmvYXyeBsMbJOFz2PbWb6YcFgk/trCLoelA:wQy36PmvYXLT/trg7u

Malware Config

Targets

    • Target

      hurtownia2018full.sql

    • Size

      11KB

    • MD5

      f659bce6e2dd947f04eb35dcb0ad9fbd

    • SHA1

      f8b5aaabcb81313af8346e1c2a6971ce968170e7

    • SHA256

      eea3daa9f4c7ce4a1c649661a973c663daa6d8b82fc95521ad5264a2ff05a475

    • SHA512

      7efab4fb1b2fa1be428ed89482952a34203782d7537b8bf50950b74f2ba00d98682a79b1f8a3e1ba583601c85c1711da1aa0f4d4bd06cc1ff9d5ad0e2b86d2a2

    • SSDEEP

      192:wQyWu6PmvYXyeBsMbJOFz2PbWb6YcFgk/trCLoelA:wQy36PmvYXLT/trg7u

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks