General

  • Target

    97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e

  • Size

    2.5MB

  • Sample

    240726-bcqwgswejq

  • MD5

    3a8cf309ffd3c98786ac9e6b285fd921

  • SHA1

    1d0da90f5c79780db52124f1d749170b1d6b927a

  • SHA256

    97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e

  • SHA512

    9bbed442ac0535f98f314f5f114b38d9c42d29a57a79110c28ee5eb80b099c46c0c6513f3b0f21f4a3f02b4f7674557912fb88aa8a901d3101af4feee77c878e

  • SSDEEP

    49152:Ih2KUWaOYeSMZtmpABLrVGAv/LP5DqDcFaaOnKnLK7nb9bE:F1TOYGLmEVzBcqaaOnKnLK7n

Malware Config

Targets

    • Target

      97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e

    • Size

      2.5MB

    • MD5

      3a8cf309ffd3c98786ac9e6b285fd921

    • SHA1

      1d0da90f5c79780db52124f1d749170b1d6b927a

    • SHA256

      97d9447076e28acb5fa024573e7edfa4b0698b8d46e66d17a2cc7275492dc74e

    • SHA512

      9bbed442ac0535f98f314f5f114b38d9c42d29a57a79110c28ee5eb80b099c46c0c6513f3b0f21f4a3f02b4f7674557912fb88aa8a901d3101af4feee77c878e

    • SSDEEP

      49152:Ih2KUWaOYeSMZtmpABLrVGAv/LP5DqDcFaaOnKnLK7nb9bE:F1TOYGLmEVzBcqaaOnKnLK7n

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks