General

  • Target

    44c0051565452b0923a8225586052650N.exe

  • Size

    1.9MB

  • Sample

    240707-f6kc1sxcnc

  • MD5

    44c0051565452b0923a8225586052650

  • SHA1

    0f011046bba7713aba42b0e68cad19bfd0488c91

  • SHA256

    4bba3602dddba48db81b06cbe5f4c1c1cec1b97afea9bc0cec72fc6073bdd281

  • SHA512

    aa3396768d7e23ea90e3d875178d702b27afb0af89e0ca412a5475dd80b2601e36e6d04f9c118db82ed8941311c5d58f3dda4cd2a5b242bc354e69dee3ca472e

  • SSDEEP

    49152:Lz071uv4BPMkyW10/w16BvZXBCurmhS+T:NAB9

Malware Config

Targets

    • Target

      44c0051565452b0923a8225586052650N.exe

    • Size

      1.9MB

    • MD5

      44c0051565452b0923a8225586052650

    • SHA1

      0f011046bba7713aba42b0e68cad19bfd0488c91

    • SHA256

      4bba3602dddba48db81b06cbe5f4c1c1cec1b97afea9bc0cec72fc6073bdd281

    • SHA512

      aa3396768d7e23ea90e3d875178d702b27afb0af89e0ca412a5475dd80b2601e36e6d04f9c118db82ed8941311c5d58f3dda4cd2a5b242bc354e69dee3ca472e

    • SSDEEP

      49152:Lz071uv4BPMkyW10/w16BvZXBCurmhS+T:NAB9

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks