General

  • Target

    9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2

  • Size

    3.6MB

  • Sample

    250128-nxqsfaxnd1

  • MD5

    e7dd06d1755e37f24bf7971c4a2b26b0

  • SHA1

    0e52e6641b80a32c065d7c0b057be4e4e42c76f3

  • SHA256

    9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2

  • SHA512

    98f09450f9f6b1acdc5945912d7db68ea9f1543959ba897ad262408b5686cd15345108b68e6b21647a0685dfcc63f80c6929308b2d55cd1ffce7d6e2abf6e549

  • SSDEEP

    49152:mM1J3BYJUY53ZzpN66OMkhsBA/YV5IY96tOoNyki3BcmNxh+PRmOMhR:mM1J36Jbp3bBA/8IYCbYtxcm5+ZS

Malware Config

Targets

    • Target

      9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2

    • Size

      3.6MB

    • MD5

      e7dd06d1755e37f24bf7971c4a2b26b0

    • SHA1

      0e52e6641b80a32c065d7c0b057be4e4e42c76f3

    • SHA256

      9294c121323fdee121ca0dc25c6e284cfba69b5726f4e6e96ac90e38e3611bc2

    • SHA512

      98f09450f9f6b1acdc5945912d7db68ea9f1543959ba897ad262408b5686cd15345108b68e6b21647a0685dfcc63f80c6929308b2d55cd1ffce7d6e2abf6e549

    • SSDEEP

      49152:mM1J3BYJUY53ZzpN66OMkhsBA/YV5IY96tOoNyki3BcmNxh+PRmOMhR:mM1J36Jbp3bBA/8IYCbYtxcm5+ZS

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks