General

  • Target

    1374c7b7f0430f2e8b11cdf34e1d4150N.exe

  • Size

    1.8MB

  • Sample

    240722-1g59eazbjf

  • MD5

    1374c7b7f0430f2e8b11cdf34e1d4150

  • SHA1

    2125c473088c20d1fdb17038073d143450334d19

  • SHA256

    a701ee4402011382c957f4aefc6e9f60306c60280160efd88b14f9db3298a1a7

  • SHA512

    408a4ff9a3ef0ec9b3904d849dc83c707fe11390922b233bf92021497eef91f519bacfc0b8b095445efeb6cec86c6e5882a64c0fed90793bb1073586985a174a

  • SSDEEP

    49152:Lz071uv4BPMkHC0IlnASEx/RiNcT1Dmbm1q:NAB2

Malware Config

Targets

    • Target

      1374c7b7f0430f2e8b11cdf34e1d4150N.exe

    • Size

      1.8MB

    • MD5

      1374c7b7f0430f2e8b11cdf34e1d4150

    • SHA1

      2125c473088c20d1fdb17038073d143450334d19

    • SHA256

      a701ee4402011382c957f4aefc6e9f60306c60280160efd88b14f9db3298a1a7

    • SHA512

      408a4ff9a3ef0ec9b3904d849dc83c707fe11390922b233bf92021497eef91f519bacfc0b8b095445efeb6cec86c6e5882a64c0fed90793bb1073586985a174a

    • SSDEEP

      49152:Lz071uv4BPMkHC0IlnASEx/RiNcT1Dmbm1q:NAB2

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks