General

  • Target

    https://drive.google.com/file/d/1YGNp6QDWI7kQ6zjwGyu3iaBoYHzpKDzv/view?usp=sharing

  • Sample

    240802-ytzahstang

Malware Config

Targets

    • Target

      https://drive.google.com/file/d/1YGNp6QDWI7kQ6zjwGyu3iaBoYHzpKDzv/view?usp=sharing

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks