General

  • Target

    acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509.vbs

  • Size

    12.7MB

  • Sample

    250131-eyn6kayjhz

  • MD5

    f7650386857dd0d31fb2a1e984dfd3b5

  • SHA1

    f273746309e4dff543059ec934895108dd2b6244

  • SHA256

    acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509

  • SHA512

    e8421e56ed514f38780d4c4d3261810c3b7374c3afad7016de0ef50905dba12d2661206162865da93ada5eeb733d9ed985fd2a4f205ee248a2ca3a3fa5607616

  • SSDEEP

    49152:BnxqEP6D/zp8K91y5+30k5xTZq+4+EtVGnKTSB4IpQsBtK+gvA9hZKwPBdko9cgD:C

Malware Config

Targets

    • Target

      acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509.vbs

    • Size

      12.7MB

    • MD5

      f7650386857dd0d31fb2a1e984dfd3b5

    • SHA1

      f273746309e4dff543059ec934895108dd2b6244

    • SHA256

      acdcc9515147f1691ddb2c7cbd352a67ef6f0e57cb72ea593df2bd2fe01f0509

    • SHA512

      e8421e56ed514f38780d4c4d3261810c3b7374c3afad7016de0ef50905dba12d2661206162865da93ada5eeb733d9ed985fd2a4f205ee248a2ca3a3fa5607616

    • SSDEEP

      49152:BnxqEP6D/zp8K91y5+30k5xTZq+4+EtVGnKTSB4IpQsBtK+gvA9hZKwPBdko9cgD:C

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks