General

  • Target

    8969d20d6f6de4bf197080e655720050N.exe

  • Size

    5.4MB

  • Sample

    240721-jdqacawdnh

  • MD5

    8969d20d6f6de4bf197080e655720050

  • SHA1

    3af590ee498585e2373431719f62abfc9bef7df6

  • SHA256

    75348cb42cd9388b4205754c3ffed9ac5bd13aa6c3f1917caa53acde8b29f349

  • SHA512

    7f988b25e9ccc019143b66ac43d71f267594c15a7839dac2320ed8f047573f47c2237480625a7dd696c21b0b70d214dcb76fe85ffee0cd0c2e04451907fc520c

  • SSDEEP

    98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S

Malware Config

Targets

    • Target

      8969d20d6f6de4bf197080e655720050N.exe

    • Size

      5.4MB

    • MD5

      8969d20d6f6de4bf197080e655720050

    • SHA1

      3af590ee498585e2373431719f62abfc9bef7df6

    • SHA256

      75348cb42cd9388b4205754c3ffed9ac5bd13aa6c3f1917caa53acde8b29f349

    • SHA512

      7f988b25e9ccc019143b66ac43d71f267594c15a7839dac2320ed8f047573f47c2237480625a7dd696c21b0b70d214dcb76fe85ffee0cd0c2e04451907fc520c

    • SSDEEP

      98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks