General

  • Target

    a41ca2f8089198574a9894a404cc5880N.exe

  • Size

    3.1MB

  • Sample

    240901-getytatcmg

  • MD5

    a41ca2f8089198574a9894a404cc5880

  • SHA1

    8767f84f3fa1a0d58f552c5473442097f628b4e7

  • SHA256

    7a8e7d41499ebc815fbaa61d2bb324a3167fd041254ff3aa9b395928fa00893f

  • SHA512

    36e98c684a48c9026ddb93c61ac323a08f080ff67d8d2ed66f0612b43c0a250a4ac1990d694b95a56101fb4cab43b5f5d6cbf0992edbf9faa8bc3e280ea53ec6

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWx:7bBeSFkF

Malware Config

Targets

    • Target

      a41ca2f8089198574a9894a404cc5880N.exe

    • Size

      3.1MB

    • MD5

      a41ca2f8089198574a9894a404cc5880

    • SHA1

      8767f84f3fa1a0d58f552c5473442097f628b4e7

    • SHA256

      7a8e7d41499ebc815fbaa61d2bb324a3167fd041254ff3aa9b395928fa00893f

    • SHA512

      36e98c684a48c9026ddb93c61ac323a08f080ff67d8d2ed66f0612b43c0a250a4ac1990d694b95a56101fb4cab43b5f5d6cbf0992edbf9faa8bc3e280ea53ec6

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWx:7bBeSFkF

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks