General

  • Target

    67f1b1b206553935bb1ada1c6d2313c7966d92fbc0980146d697f5f9fa79bd81

  • Size

    1.8MB

  • Sample

    240527-24849ade4w

  • MD5

    2693d94a8b9aa4f917b3800cc29af9e3

  • SHA1

    355f043aa93f19f8fd94c70a204ebff850f239ba

  • SHA256

    67f1b1b206553935bb1ada1c6d2313c7966d92fbc0980146d697f5f9fa79bd81

  • SHA512

    93e179b7902e4c77d17b27502ba3854e376ba104eea917fa0e4ca1e21c40c44d4a12a5df9d7496e762f19303fe562454e9e511ade647c66e747086a8e49debd9

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjpbc8nJwbomvu2Nrlum7+a7EtLgCPimz5:Lz071uv4BPMkHC0IBcAUNRSa7kj5zua

Malware Config

Targets

    • Target

      67f1b1b206553935bb1ada1c6d2313c7966d92fbc0980146d697f5f9fa79bd81

    • Size

      1.8MB

    • MD5

      2693d94a8b9aa4f917b3800cc29af9e3

    • SHA1

      355f043aa93f19f8fd94c70a204ebff850f239ba

    • SHA256

      67f1b1b206553935bb1ada1c6d2313c7966d92fbc0980146d697f5f9fa79bd81

    • SHA512

      93e179b7902e4c77d17b27502ba3854e376ba104eea917fa0e4ca1e21c40c44d4a12a5df9d7496e762f19303fe562454e9e511ade647c66e747086a8e49debd9

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkUCCWvLEvjpbc8nJwbomvu2Nrlum7+a7EtLgCPimz5:Lz071uv4BPMkHC0IBcAUNRSa7kj5zua

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks