General

  • Target

    6b2100ac6e64bf3317003bc4670f45e0N.exe

  • Size

    1.2MB

  • Sample

    240803-jal4hswgnm

  • MD5

    6b2100ac6e64bf3317003bc4670f45e0

  • SHA1

    4569ce434fea024feca6716c3de56c2768dbe83d

  • SHA256

    5d538c76f2311f359f46d59114af53129b41c0960a744be7f6ae00bb91786320

  • SHA512

    0593e507d98eec690eda4db965e294ffd2c135978438bd70207c832fe0233b53576cfad20ec64e4b4788d928118fd4e52f15a82d1530badf0d8e77e2aa9e4f45

  • SSDEEP

    24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWYEAhnraiJqUGMONXEQ:Lz071uv4BPMkibTIA5EAR24GbV

Malware Config

Targets

    • Target

      6b2100ac6e64bf3317003bc4670f45e0N.exe

    • Size

      1.2MB

    • MD5

      6b2100ac6e64bf3317003bc4670f45e0

    • SHA1

      4569ce434fea024feca6716c3de56c2768dbe83d

    • SHA256

      5d538c76f2311f359f46d59114af53129b41c0960a744be7f6ae00bb91786320

    • SHA512

      0593e507d98eec690eda4db965e294ffd2c135978438bd70207c832fe0233b53576cfad20ec64e4b4788d928118fd4e52f15a82d1530badf0d8e77e2aa9e4f45

    • SSDEEP

      24576:zv3/fTLF671TilQFG4P5PMkibTJH+2Q/ynKeWYEAhnraiJqUGMONXEQ:Lz071uv4BPMkibTIA5EAR24GbV

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks