General

  • Target

    33d109f97d28736bee0a77304eec866144d6d0977fcab1da84267708ef3eb638.exe

  • Size

    3.1MB

  • Sample

    240705-d4kjwstgme

  • MD5

    853f7b06cec0008f3720f5ab93a66fd0

  • SHA1

    ed415fdbb09bf56d5ace85180695675f9b6b8017

  • SHA256

    33d109f97d28736bee0a77304eec866144d6d0977fcab1da84267708ef3eb638

  • SHA512

    1d86105eb50b7df0e2eda4384e84a81ff4c3015bae9630fd2401bb43ecb34ac88f6c805cf8e4dcc07006b71605a24e7e1795155bfed93b5262ec175d1aea01c1

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWg:7bBeSFkc

Malware Config

Targets

    • Target

      33d109f97d28736bee0a77304eec866144d6d0977fcab1da84267708ef3eb638.exe

    • Size

      3.1MB

    • MD5

      853f7b06cec0008f3720f5ab93a66fd0

    • SHA1

      ed415fdbb09bf56d5ace85180695675f9b6b8017

    • SHA256

      33d109f97d28736bee0a77304eec866144d6d0977fcab1da84267708ef3eb638

    • SHA512

      1d86105eb50b7df0e2eda4384e84a81ff4c3015bae9630fd2401bb43ecb34ac88f6c805cf8e4dcc07006b71605a24e7e1795155bfed93b5262ec175d1aea01c1

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWg:7bBeSFkc

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks