General

  • Target

    build.exe

  • Size

    5.1MB

  • Sample

    241225-vdsw1szkal

  • MD5

    d2683333c33c9c8e7a0f0d81b65b3bc0

  • SHA1

    2ea3f0156f0a47dd6801cc0e576bb4cd88932ef9

  • SHA256

    932f71143cd50338a8557d6e34058d4758ffaaeda8183a9811d296ae75ee8b58

  • SHA512

    41ae89fcefa854eda56211d51ae86435406262520bb5e66d4e61e3838b215bc28f464beb705bd104bb18c0bcb0f033ea0603de12741d87aaae0951a302045602

  • SSDEEP

    98304:HNZOsiju24uvwISssMuIUbmFecKEKPssyWiNT4uChIhZ5:Ksiju24LNrIQmMTqyGd

Malware Config

Targets

    • Target

      build.exe

    • Size

      5.1MB

    • MD5

      d2683333c33c9c8e7a0f0d81b65b3bc0

    • SHA1

      2ea3f0156f0a47dd6801cc0e576bb4cd88932ef9

    • SHA256

      932f71143cd50338a8557d6e34058d4758ffaaeda8183a9811d296ae75ee8b58

    • SHA512

      41ae89fcefa854eda56211d51ae86435406262520bb5e66d4e61e3838b215bc28f464beb705bd104bb18c0bcb0f033ea0603de12741d87aaae0951a302045602

    • SSDEEP

      98304:HNZOsiju24uvwISssMuIUbmFecKEKPssyWiNT4uChIhZ5:Ksiju24LNrIQmMTqyGd

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks