General

  • Target

    b280cc4e78a7bff8d072713f8b4beb29.bin

  • Size

    2.0MB

  • Sample

    241119-tktapaxhre

  • MD5

    868a4850f14b324e6f1682491c124730

  • SHA1

    0b295345910509be64f0333f90d5c9fe63bf4311

  • SHA256

    9533919643c9ba9f98177f54a24eb89c092266ee83c1237ee485d46fd3bca3b9

  • SHA512

    c323c2b8dab0df74d8c91ef3a8de9810e349740f5dfa421a77a17fa469bd9c0af3d289e0ac39c7fb862bc4a91e5e33b5c83d73004c2fda5946a10c29ab616be7

  • SSDEEP

    49152:NjXsWhOq9oL2MR80h8aAAmpl+43PyCf2WY2hB7pThJHDJ3cS1RbUHNAtK:ZX5h/CL2EGbUgkWY2/HFV1RbUStK

Malware Config

Targets

    • Target

      ae3ae350218998f35fe4582d010844c4f62490af30af438c1735e5037d115fc1.exe

    • Size

      2.0MB

    • MD5

      b280cc4e78a7bff8d072713f8b4beb29

    • SHA1

      76e5ab8eda5c292b4f602e8a73c037f4623cb172

    • SHA256

      ae3ae350218998f35fe4582d010844c4f62490af30af438c1735e5037d115fc1

    • SHA512

      51e8208fefa8cb51930468aa172f7b07056bf98281d7baf0108537fbab1291f1fc1826e708dec31f57432f7627eb2bccb3d05dc924b1e38f4b290ecb03c7861d

    • SSDEEP

      49152:BMJt5dwHjwTFKLpVI1M5crh/XBSgqJXEjvZ80eYcZxXBkK8jXCv:Bot4DrVaEcugqJUDDcZl4C

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks