General

  • Target

    54d75b69a448bda4dedb9e6fe3335d7c2457e0d0264c7c457cca17364c970eca

  • Size

    1.8MB

  • Sample

    240613-2xextsxgmp

  • MD5

    f4f69f2d004a582e6530e18087d13df7

  • SHA1

    4490eabb249b77d8aa18d3b366cba0674a7f147b

  • SHA256

    54d75b69a448bda4dedb9e6fe3335d7c2457e0d0264c7c457cca17364c970eca

  • SHA512

    7977dfdec7f85c172e90a48bacc000d3b68d72febb00967f410ddea94838c42b396a366993b920c8a5be15664887b7a87f263ce0f0bc2ca3c59dbe0b5b7b4d2d

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZWNChZ7fI+7RrTFl6hvVjC:Lz071uv4BPMkyW10/w16BvZX71Fq86zM

Malware Config

Targets

    • Target

      54d75b69a448bda4dedb9e6fe3335d7c2457e0d0264c7c457cca17364c970eca

    • Size

      1.8MB

    • MD5

      f4f69f2d004a582e6530e18087d13df7

    • SHA1

      4490eabb249b77d8aa18d3b366cba0674a7f147b

    • SHA256

      54d75b69a448bda4dedb9e6fe3335d7c2457e0d0264c7c457cca17364c970eca

    • SHA512

      7977dfdec7f85c172e90a48bacc000d3b68d72febb00967f410ddea94838c42b396a366993b920c8a5be15664887b7a87f263ce0f0bc2ca3c59dbe0b5b7b4d2d

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkyW1HU/ek5Q1szp5NnNvZWNChZ7fI+7RrTFl6hvVjC:Lz071uv4BPMkyW10/w16BvZX71Fq86zM

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Command and Control

Web Service

1
T1102

Tasks