General

  • Target

    b76ecfa778793bdf379a63b55d60b4b3941e10b743e48ae3b414b3522212abdb.exe

  • Size

    14.0MB

  • Sample

    241221-dhj18s1pck

  • MD5

    228c09c31156d45dfe94195bb34d1399

  • SHA1

    20c6ce4757be1399032b2ac6873dc505c1d02839

  • SHA256

    b76ecfa778793bdf379a63b55d60b4b3941e10b743e48ae3b414b3522212abdb

  • SHA512

    003557ad24f826143a50cce81b56489c7768951ecdfef9b01fe645f5453ae8cf36bd1b2b6e5e3bd8d27131cf3a2d54d20b7c699ae582e2528b65aee8a560f40c

  • SSDEEP

    393216:hPsdXtBcda7nzo7Vd7Qv1CPwDvt3uFRCyGTQP76NuudqfZnXSdEVB3:hITk1

Malware Config

Targets

    • Target

      b76ecfa778793bdf379a63b55d60b4b3941e10b743e48ae3b414b3522212abdb.exe

    • Size

      14.0MB

    • MD5

      228c09c31156d45dfe94195bb34d1399

    • SHA1

      20c6ce4757be1399032b2ac6873dc505c1d02839

    • SHA256

      b76ecfa778793bdf379a63b55d60b4b3941e10b743e48ae3b414b3522212abdb

    • SHA512

      003557ad24f826143a50cce81b56489c7768951ecdfef9b01fe645f5453ae8cf36bd1b2b6e5e3bd8d27131cf3a2d54d20b7c699ae582e2528b65aee8a560f40c

    • SSDEEP

      393216:hPsdXtBcda7nzo7Vd7Qv1CPwDvt3uFRCyGTQP76NuudqfZnXSdEVB3:hITk1

    • XMRig Miner payload

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks