General

  • Target

    89590af62ea707d6a89e128ad04283e78b0aaf7901a93f0c9a488cd5eb5e14e7

  • Size

    5.6MB

  • Sample

    241119-lg563stbrf

  • MD5

    fdc506ec92188c5521dc7c6ba1011ac0

  • SHA1

    29158e155ba015f299a32b2d48bdb12eaf992794

  • SHA256

    89590af62ea707d6a89e128ad04283e78b0aaf7901a93f0c9a488cd5eb5e14e7

  • SHA512

    855004f93b50b4aa5d16d5740213ecbd95235d0eea211633aa742de2d4e789e4a5ce6fa7b6dfff5b63ebe679391b7aefb7629562036f88d9c36b1523c074527e

  • SSDEEP

    98304:xRjPz9KDzUU8O5/B/LJ25E9SVh86sS3TRknQ3ss2MApp9meypA3cPDu7:xFKoU8O5/b2XViSjX310SeyGc7u7

Malware Config

Targets

    • Target

      89590af62ea707d6a89e128ad04283e78b0aaf7901a93f0c9a488cd5eb5e14e7

    • Size

      5.6MB

    • MD5

      fdc506ec92188c5521dc7c6ba1011ac0

    • SHA1

      29158e155ba015f299a32b2d48bdb12eaf992794

    • SHA256

      89590af62ea707d6a89e128ad04283e78b0aaf7901a93f0c9a488cd5eb5e14e7

    • SHA512

      855004f93b50b4aa5d16d5740213ecbd95235d0eea211633aa742de2d4e789e4a5ce6fa7b6dfff5b63ebe679391b7aefb7629562036f88d9c36b1523c074527e

    • SSDEEP

      98304:xRjPz9KDzUU8O5/B/LJ25E9SVh86sS3TRknQ3ss2MApp9meypA3cPDu7:xFKoU8O5/b2XViSjX310SeyGc7u7

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks