General

  • Target

    d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432.exe

  • Size

    5.0MB

  • Sample

    241009-cv42hatgpr

  • MD5

    1a67a432e7ab0bcd2189f3f4142f2ae4

  • SHA1

    168307b08e5c7a740d7dfcaa4be93e02f80e3fb9

  • SHA256

    d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432

  • SHA512

    f849ea7ba3bd6865935065d542247a9256c0ccc669f9f57639e44c374c4aa3b03ff4a33f956f6027cb5aa97069ec5b9eb943c1d57034cc7d9821f52f44ffde9b

  • SSDEEP

    98304:yGp6tj9L5rremSnrC7ag91f3dOuyUPpSJawwSDJiRRiy5CevO+OGLUA:J6N96ut9xwUPpSDwMiRsKhhpX

Malware Config

Targets

    • Target

      d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432.exe

    • Size

      5.0MB

    • MD5

      1a67a432e7ab0bcd2189f3f4142f2ae4

    • SHA1

      168307b08e5c7a740d7dfcaa4be93e02f80e3fb9

    • SHA256

      d19e4b7894fe7e6190d942c5718bb61b95b0ffd7380cb056891508ca6d163432

    • SHA512

      f849ea7ba3bd6865935065d542247a9256c0ccc669f9f57639e44c374c4aa3b03ff4a33f956f6027cb5aa97069ec5b9eb943c1d57034cc7d9821f52f44ffde9b

    • SSDEEP

      98304:yGp6tj9L5rremSnrC7ag91f3dOuyUPpSJawwSDJiRRiy5CevO+OGLUA:J6N96ut9xwUPpSDwMiRsKhhpX

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks