General

  • Target

    c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71

  • Size

    2.8MB

  • Sample

    240603-q3mdbahh63

  • MD5

    c313d79bb52d3dc1a0fdd298a6c47810

  • SHA1

    0acb3c5b6a6bd568656c7dc9f2bebaf0ea01207a

  • SHA256

    c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71

  • SHA512

    c937b08e72578c71d79387dbb625436e7381b784a8a3977a50cc758de8badfc57e8c566db135aa1e6f1ea01b682c4675302ee25c4f74e60238ca2c4714834a08

  • SSDEEP

    49152:VIf2lo986T2njmZHDIkduvYcg9/YyCBGQPDK2z3fANo7+VnAeRq8HBaegPzcxCnG:VIKdiZvdPf2DGQ7L3gR7HBaegPzcxCnG

Malware Config

Targets

    • Target

      c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71

    • Size

      2.8MB

    • MD5

      c313d79bb52d3dc1a0fdd298a6c47810

    • SHA1

      0acb3c5b6a6bd568656c7dc9f2bebaf0ea01207a

    • SHA256

      c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71

    • SHA512

      c937b08e72578c71d79387dbb625436e7381b784a8a3977a50cc758de8badfc57e8c566db135aa1e6f1ea01b682c4675302ee25c4f74e60238ca2c4714834a08

    • SSDEEP

      49152:VIf2lo986T2njmZHDIkduvYcg9/YyCBGQPDK2z3fANo7+VnAeRq8HBaegPzcxCnG:VIKdiZvdPf2DGQ7L3gR7HBaegPzcxCnG

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks