General

  • Target

    817e2124e98b6d92d070fa61890a54d0N

  • Size

    5.5MB

  • Sample

    240908-zr631sxdrf

  • MD5

    817e2124e98b6d92d070fa61890a54d0

  • SHA1

    a69dfb184f671f063598e5a6f1317e7ca71f0da6

  • SHA256

    ab5fea51991c40e42ee58972f9a938eddc3ee01b93aa0d25f9806e86689259b1

  • SHA512

    a8aeb2727c1b8fa53cdaed6036e8c58bedd43730aae7ec6ea71920c66629b69ef654d2bdc04af782221be7bcd3e84c1f2fb2bff55e62f93e5ac4c469a49c1ebb

  • SSDEEP

    98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S

Malware Config

Targets

    • Target

      817e2124e98b6d92d070fa61890a54d0N

    • Size

      5.5MB

    • MD5

      817e2124e98b6d92d070fa61890a54d0

    • SHA1

      a69dfb184f671f063598e5a6f1317e7ca71f0da6

    • SHA256

      ab5fea51991c40e42ee58972f9a938eddc3ee01b93aa0d25f9806e86689259b1

    • SHA512

      a8aeb2727c1b8fa53cdaed6036e8c58bedd43730aae7ec6ea71920c66629b69ef654d2bdc04af782221be7bcd3e84c1f2fb2bff55e62f93e5ac4c469a49c1ebb

    • SSDEEP

      98304:34Gr/W2hRkTwVNt6MkTi+XAVd18EjU6+cVX6IwUu:3jr/TMwVNtaP4KEjl6S

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks