General

  • Target

    7FAR - ZModeler 3.1.4 (build 1142).rar

  • Size

    19.7MB

  • Sample

    241219-wnl2wsxjhv

  • MD5

    305574e146362152fdc3d3d5a86bd291

  • SHA1

    26154d5487a726f92ab2a9ea0bc4f8f88c659f16

  • SHA256

    7be84af94664fd42c740a31a89a82a51ede33cd3ce18bd42500d7d5345a0488d

  • SHA512

    0987a9ee9dfcfd10ccac940b020940c1b67f74d284a4e13169a5ba35b2dff2b58e8940ce0e8f0132b08873c3fc733fd1ee683cf510817c1b224409cec4de3377

  • SSDEEP

    393216:UQL36RFAdrEl6/laKIn0jWCmOwgot1jjYRpQM4hqSQCjDnC:U5addla1n0ieDovC20m2

Malware Config

Targets

    • Target

      7FAR - ZModeler 3.1.4 (build 1142).rar

    • Size

      19.7MB

    • MD5

      305574e146362152fdc3d3d5a86bd291

    • SHA1

      26154d5487a726f92ab2a9ea0bc4f8f88c659f16

    • SHA256

      7be84af94664fd42c740a31a89a82a51ede33cd3ce18bd42500d7d5345a0488d

    • SHA512

      0987a9ee9dfcfd10ccac940b020940c1b67f74d284a4e13169a5ba35b2dff2b58e8940ce0e8f0132b08873c3fc733fd1ee683cf510817c1b224409cec4de3377

    • SSDEEP

      393216:UQL36RFAdrEl6/laKIn0jWCmOwgot1jjYRpQM4hqSQCjDnC:U5addla1n0ieDovC20m2

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks