General

  • Target

    f525e89b1c653d7c5c13822523f4915d84d9ad68877df3025c01cc4d3e2a077d

  • Size

    2.9MB

  • Sample

    240614-gq8aksxfkf

  • MD5

    a06ab228e68a0d769cd683ca8fb1bfc0

  • SHA1

    a24bf86bd4183165989fb95397fdc1b1d651f72a

  • SHA256

    f525e89b1c653d7c5c13822523f4915d84d9ad68877df3025c01cc4d3e2a077d

  • SHA512

    c0ec2da30b30c128c6fec72d35cdc192834b25ffacab068c9c5ab019c378d7ef4b29917ea65f6be530548d0acf5bc3f585219ceb1f6721173261c114b3088134

  • SSDEEP

    49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/mlj:71ONtyBeSFkXV1etEKLlWUTOfeiRA2Rb

Malware Config

Targets

    • Target

      f525e89b1c653d7c5c13822523f4915d84d9ad68877df3025c01cc4d3e2a077d

    • Size

      2.9MB

    • MD5

      a06ab228e68a0d769cd683ca8fb1bfc0

    • SHA1

      a24bf86bd4183165989fb95397fdc1b1d651f72a

    • SHA256

      f525e89b1c653d7c5c13822523f4915d84d9ad68877df3025c01cc4d3e2a077d

    • SHA512

      c0ec2da30b30c128c6fec72d35cdc192834b25ffacab068c9c5ab019c378d7ef4b29917ea65f6be530548d0acf5bc3f585219ceb1f6721173261c114b3088134

    • SSDEEP

      49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0IlnASEx/mlj:71ONtyBeSFkXV1etEKLlWUTOfeiRA2Rb

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Detects executables containing URLs to raw contents of a Github gist

    • UPX dump on OEP (original entry point)

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks