General

  • Target

    Trojan.Win64.CoinMiner.pz-d322a1d15023daa4b6f46b548c3b63c9f66cb28b35864db9422f1052766cae51N

  • Size

    1.0MB

  • Sample

    240916-2yhecathrg

  • MD5

    465d383ab84081ddcb616f8ce505fef0

  • SHA1

    14d86a4e55988898abb265a8e41d7955419ffdb0

  • SHA256

    d322a1d15023daa4b6f46b548c3b63c9f66cb28b35864db9422f1052766cae51

  • SHA512

    2ed89d4c3c96f9fcb4da28e360e680de4a2110820818c5c807badcf53392b1aeb90e096ede1f7da32266600bea3af2c1ec6872682eb6975b3e114914bd071af1

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQGCZLFdGm13J/NudDmzk9A:E5aIwC+Agr6S/FpJQ6zT

Malware Config

Targets

    • Target

      Trojan.Win64.CoinMiner.pz-d322a1d15023daa4b6f46b548c3b63c9f66cb28b35864db9422f1052766cae51N

    • Size

      1.0MB

    • MD5

      465d383ab84081ddcb616f8ce505fef0

    • SHA1

      14d86a4e55988898abb265a8e41d7955419ffdb0

    • SHA256

      d322a1d15023daa4b6f46b548c3b63c9f66cb28b35864db9422f1052766cae51

    • SHA512

      2ed89d4c3c96f9fcb4da28e360e680de4a2110820818c5c807badcf53392b1aeb90e096ede1f7da32266600bea3af2c1ec6872682eb6975b3e114914bd071af1

    • SSDEEP

      24576:zQ5aILMCfmAUjzX6xQGCZLFdGm13J/NudDmzk9A:E5aIwC+Agr6S/FpJQ6zT

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Trickbot

      Developed in 2016, TrickBot is one of the more recent banking Trojans.

    • Trickbot x86 loader

      Detected Trickbot's x86 loader that unpacks the x86 payload.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks