General

  • Target

    69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36.exe

  • Size

    2.5MB

  • Sample

    241115-tv2d2s1lel

  • MD5

    1e98c4b685df4156ed75fcc0a6b93ba9

  • SHA1

    0ca672621f2bcd3649955ed748142f698f596601

  • SHA256

    69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36

  • SHA512

    7d36170f464787373f0d9aa4af4c1949962bc21722fdf38ed934bff5b236fe17e4717f951f735b9df8e766ccf7c1f653591eb607613e016bdb05198130048871

  • SSDEEP

    49152:4FUPj9hHjc2Hil9gJaEgCR37gGVMISw6RtmGNIOLD1ciNKWI2O6xYWb3Kuz/+nr:77vHM9gJaFCRPS3f7LrrOaYY6u8r

Malware Config

Targets

    • Target

      69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36.exe

    • Size

      2.5MB

    • MD5

      1e98c4b685df4156ed75fcc0a6b93ba9

    • SHA1

      0ca672621f2bcd3649955ed748142f698f596601

    • SHA256

      69ac86b8ad0ad7199006064fd88cb3b4bb3f60e543442b3e5d1a8a3e58765e36

    • SHA512

      7d36170f464787373f0d9aa4af4c1949962bc21722fdf38ed934bff5b236fe17e4717f951f735b9df8e766ccf7c1f653591eb607613e016bdb05198130048871

    • SSDEEP

      49152:4FUPj9hHjc2Hil9gJaEgCR37gGVMISw6RtmGNIOLD1ciNKWI2O6xYWb3Kuz/+nr:77vHM9gJaFCRPS3f7LrrOaYY6u8r

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks