General

  • Target

    Melonity.7z

  • Size

    75.8MB

  • Sample

    241120-p16hqsxelm

  • MD5

    19d13cc25d3df6877e1cff173f4f7e19

  • SHA1

    0c8fc7c0135f08587d16d3e525466d02181b3603

  • SHA256

    3cfc46b4322ca60c012b069e781d8dab86d778e508441848b442d873a47a450d

  • SHA512

    31790f097a351bd2c3097207bf1378c7b08f0cf8da2e6227e915e2f40f7a6755f441c7a89eb630a029641b1786917afb3fd8ae48456b3f32603ece7c2c35d5e6

  • SSDEEP

    1572864:K+pi9HqhhRBVIsh7ckOwTbFZlROpHou2U1bSOWpQQYcEiTS4o:ri65BLTbFZlROFo32gQQYTia

Malware Config

Targets

    • Target

      Melonity.7z

    • Size

      75.8MB

    • MD5

      19d13cc25d3df6877e1cff173f4f7e19

    • SHA1

      0c8fc7c0135f08587d16d3e525466d02181b3603

    • SHA256

      3cfc46b4322ca60c012b069e781d8dab86d778e508441848b442d873a47a450d

    • SHA512

      31790f097a351bd2c3097207bf1378c7b08f0cf8da2e6227e915e2f40f7a6755f441c7a89eb630a029641b1786917afb3fd8ae48456b3f32603ece7c2c35d5e6

    • SSDEEP

      1572864:K+pi9HqhhRBVIsh7ckOwTbFZlROpHou2U1bSOWpQQYcEiTS4o:ri65BLTbFZlROFo32gQQYTia

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks