General

  • Target

    1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321.cmd

  • Size

    400B

  • Sample

    250125-j15csavqdn

  • MD5

    2eeefd9c6e45d4aa21861b1296f67585

  • SHA1

    a946bbc6ddecbfc98e418f5cd268fd9e31012f21

  • SHA256

    1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321

  • SHA512

    ae169104fd73052c11deadc0b3470e6a64e53edc17818e75576c0077eef27a7633c6c94ea96f9ebfe4321f6184d448dd9b218aee35e6ffea40a446308af844e0

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://biteblob.com/Download/J4wO2GduKNJmX3/build.exe

Targets

    • Target

      1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321.cmd

    • Size

      400B

    • MD5

      2eeefd9c6e45d4aa21861b1296f67585

    • SHA1

      a946bbc6ddecbfc98e418f5cd268fd9e31012f21

    • SHA256

      1360212e053f0c7cfad357be61c1e591e4b35842c020279f08b3590705cc1321

    • SHA512

      ae169104fd73052c11deadc0b3470e6a64e53edc17818e75576c0077eef27a7633c6c94ea96f9ebfe4321f6184d448dd9b218aee35e6ffea40a446308af844e0

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks