General

  • Target

    a02be0fe2b6c1d67b217e42591b1ebcaca522550421551d73d40cdaf50341d9c

  • Size

    2.7MB

  • Sample

    240530-bd45hagf5s

  • MD5

    3195929cde58b8b85b7b0ff6ce6eb786

  • SHA1

    210da2a8b43f01d387b8c09102df49e4e2f25798

  • SHA256

    a02be0fe2b6c1d67b217e42591b1ebcaca522550421551d73d40cdaf50341d9c

  • SHA512

    7a9c93b81c2f55f126f898523e85fa9e5de008e83bbfb67dce9d2302dcdfb87b4c0039913a9896733cb8dd14b04c1e289b00442b0241e5533364dcbf25e14a63

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdk2aX:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RT

Malware Config

Targets

    • Target

      a02be0fe2b6c1d67b217e42591b1ebcaca522550421551d73d40cdaf50341d9c

    • Size

      2.7MB

    • MD5

      3195929cde58b8b85b7b0ff6ce6eb786

    • SHA1

      210da2a8b43f01d387b8c09102df49e4e2f25798

    • SHA256

      a02be0fe2b6c1d67b217e42591b1ebcaca522550421551d73d40cdaf50341d9c

    • SHA512

      7a9c93b81c2f55f126f898523e85fa9e5de008e83bbfb67dce9d2302dcdfb87b4c0039913a9896733cb8dd14b04c1e289b00442b0241e5533364dcbf25e14a63

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkFfdk2aX:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RT

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks