General

  • Target

    bd5a9ef64516b7d6df106acc6e3b51addb1a7513c4744dbe7e552dd02970d915

  • Size

    2.7MB

  • Sample

    240614-dyyjkaxdlj

  • MD5

    3c2e0476b38af2a81dda6693ccd39b68

  • SHA1

    379e899cff7d76ff8f3671eea243cb7668580fc4

  • SHA256

    bd5a9ef64516b7d6df106acc6e3b51addb1a7513c4744dbe7e552dd02970d915

  • SHA512

    a8f345211b62e41af7d853b0d52fae8d274bbb9180195c50fab522a3bd9c5771325f885bc5fef19d7506fcaa79b975221186e4bfe87cbc1070646b5ef7254c3f

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/mCC:71ONtyBeSFkXV1etEKLlWUTOfeiRA2Rj

Malware Config

Targets

    • Target

      bd5a9ef64516b7d6df106acc6e3b51addb1a7513c4744dbe7e552dd02970d915

    • Size

      2.7MB

    • MD5

      3c2e0476b38af2a81dda6693ccd39b68

    • SHA1

      379e899cff7d76ff8f3671eea243cb7668580fc4

    • SHA256

      bd5a9ef64516b7d6df106acc6e3b51addb1a7513c4744dbe7e552dd02970d915

    • SHA512

      a8f345211b62e41af7d853b0d52fae8d274bbb9180195c50fab522a3bd9c5771325f885bc5fef19d7506fcaa79b975221186e4bfe87cbc1070646b5ef7254c3f

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/mCC:71ONtyBeSFkXV1etEKLlWUTOfeiRA2Rj

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks