General

  • Target

    550f056b3ad136f239163600a3fc9f50N.exe

  • Size

    3.2MB

  • Sample

    240802-e5ntda1bkh

  • MD5

    550f056b3ad136f239163600a3fc9f50

  • SHA1

    82af3c1b7a8cfc091c182525e352bc6eca75b981

  • SHA256

    5d5210b7cf69b67d321763bd92601c85c86481e8759a04a7a5c2f41202955986

  • SHA512

    e926d0531e87208ad1032c78ec92400186f0203b02c8a77d59b8d62be63fbe1f166d26a828ca71aa8efe258b70d847746027db8963060f17742ee5aacf7055ad

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWc:7bBeSFkY

Malware Config

Targets

    • Target

      550f056b3ad136f239163600a3fc9f50N.exe

    • Size

      3.2MB

    • MD5

      550f056b3ad136f239163600a3fc9f50

    • SHA1

      82af3c1b7a8cfc091c182525e352bc6eca75b981

    • SHA256

      5d5210b7cf69b67d321763bd92601c85c86481e8759a04a7a5c2f41202955986

    • SHA512

      e926d0531e87208ad1032c78ec92400186f0203b02c8a77d59b8d62be63fbe1f166d26a828ca71aa8efe258b70d847746027db8963060f17742ee5aacf7055ad

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWc:7bBeSFkY

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks