General

  • Target

    4bb002040f8036b93da4449d909c7210N.exe

  • Size

    2.3MB

  • Sample

    240807-cvrq6ssbja

  • MD5

    4bb002040f8036b93da4449d909c7210

  • SHA1

    cb8a637fe77882016515112eb001349a0fa12f04

  • SHA256

    233a51f1da7ce902b87328a2b0033b51031502f3af370d30846d8ac153759a73

  • SHA512

    3a8856bbecd2591b61d2c31b3c17bb60fed861f82857a810c07c773a7893e4387fb63ce8ffc656b87dabe9e118851fdeebe5110b9e191ae3259aeef2334bc3e0

  • SSDEEP

    49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTleL+w3:NABu

Malware Config

Targets

    • Target

      4bb002040f8036b93da4449d909c7210N.exe

    • Size

      2.3MB

    • MD5

      4bb002040f8036b93da4449d909c7210

    • SHA1

      cb8a637fe77882016515112eb001349a0fa12f04

    • SHA256

      233a51f1da7ce902b87328a2b0033b51031502f3af370d30846d8ac153759a73

    • SHA512

      3a8856bbecd2591b61d2c31b3c17bb60fed861f82857a810c07c773a7893e4387fb63ce8ffc656b87dabe9e118851fdeebe5110b9e191ae3259aeef2334bc3e0

    • SSDEEP

      49152:Lz071uv4BPMkibTIA5sf6r+WVc2HhG82g1Vr5s1PTleL+w3:NABu

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks