General

  • Target

    dd792996cc7a4240cbf2a275344a13a393d304736034fb09fe280372e34a107c

  • Size

    3.6MB

  • Sample

    250201-tejt3a1ndm

  • MD5

    89ba5e9d24155628896c522b926506d1

  • SHA1

    b87e119f7bd9e421b8fa7c3666ae0921287231fb

  • SHA256

    dd792996cc7a4240cbf2a275344a13a393d304736034fb09fe280372e34a107c

  • SHA512

    6c023b78473e0689690825d3a50eb96aded1307a66e2082c127000574d8819642ba927763016b38b9a3cb5a6e6c27c2abe8205a742db20d6ab8e2ac833a28361

  • SSDEEP

    98304:0rhw8VTDKJjizmvxgWHAfbCai0bZG5h3N10zpKVraQ:0lwceizmvxgWHAfg

Malware Config

Targets

    • Target

      dd792996cc7a4240cbf2a275344a13a393d304736034fb09fe280372e34a107c

    • Size

      3.6MB

    • MD5

      89ba5e9d24155628896c522b926506d1

    • SHA1

      b87e119f7bd9e421b8fa7c3666ae0921287231fb

    • SHA256

      dd792996cc7a4240cbf2a275344a13a393d304736034fb09fe280372e34a107c

    • SHA512

      6c023b78473e0689690825d3a50eb96aded1307a66e2082c127000574d8819642ba927763016b38b9a3cb5a6e6c27c2abe8205a742db20d6ab8e2ac833a28361

    • SSDEEP

      98304:0rhw8VTDKJjizmvxgWHAfbCai0bZG5h3N10zpKVraQ:0lwceizmvxgWHAfg

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks