General

  • Target

    0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f.exe

  • Size

    2.1MB

  • Sample

    241120-2b258svgrq

  • MD5

    ebb42b2a3a147e19b72b77a3977600c9

  • SHA1

    8e4e8e2384a226ff0840b34610c8ca2ffa4c9240

  • SHA256

    0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f

  • SHA512

    0b54d7ffaff3e44999fde5c74e3a9d3d30370cf1fc9c99268321c815a76c47ed2b906e131e43f8fe1443e1167372bd68ee2f52d5337ff16da858f380d42ddb9b

  • SSDEEP

    49152:KLn083VH2ecNONSbowqPObPca9WO7oB34W0OIFXhE9+oAnTAXUbI:QLy5PLLoB34WNIfE9rWs0I

Score
10/10

Malware Config

Targets

    • Target

      0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f.exe

    • Size

      2.1MB

    • MD5

      ebb42b2a3a147e19b72b77a3977600c9

    • SHA1

      8e4e8e2384a226ff0840b34610c8ca2ffa4c9240

    • SHA256

      0c65484e7f517cfb24dff4231117a5f115e094f12a6b99aa0c26d322f6dbfb5f

    • SHA512

      0b54d7ffaff3e44999fde5c74e3a9d3d30370cf1fc9c99268321c815a76c47ed2b906e131e43f8fe1443e1167372bd68ee2f52d5337ff16da858f380d42ddb9b

    • SSDEEP

      49152:KLn083VH2ecNONSbowqPObPca9WO7oB34W0OIFXhE9+oAnTAXUbI:QLy5PLLoB34WNIfE9rWs0I

    Score
    10/10
    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks