General

  • Target

    BitcoinPrivateKeyFinder.zip

  • Size

    2.2MB

  • Sample

    250201-zdlvxs1lhk

  • MD5

    4a685e71890904b1387d6c5a84463986

  • SHA1

    32baa61a9896b1992486dba009043c01488fbdac

  • SHA256

    61b6db96b367919bb130955c1243b7ca6fef3a1d111ffd390a4a8f66146d3eca

  • SHA512

    7ec063ed103349c7aa9676264fe26ec85da9511f8687f50c5d1098a3f172f9f2f14cba5c67754ecb627f6556449d0fea6986da2232a0b9277b984a026f38642c

  • SSDEEP

    49152:Br/zB9ruvrhgL4Wc1PU6td1zZTsc/e6HCUNCCRmM9IwavhRRVcqXKYxPxVTPfS8C:1LOrS811PU6tzZQc/e6HCUNCCIzwUfK9

Score
10/10

Malware Config

Targets

    • Target

      BitcoinPrivateKeyFinder.zip

    • Size

      2.2MB

    • MD5

      4a685e71890904b1387d6c5a84463986

    • SHA1

      32baa61a9896b1992486dba009043c01488fbdac

    • SHA256

      61b6db96b367919bb130955c1243b7ca6fef3a1d111ffd390a4a8f66146d3eca

    • SHA512

      7ec063ed103349c7aa9676264fe26ec85da9511f8687f50c5d1098a3f172f9f2f14cba5c67754ecb627f6556449d0fea6986da2232a0b9277b984a026f38642c

    • SSDEEP

      49152:Br/zB9ruvrhgL4Wc1PU6td1zZTsc/e6HCUNCCRmM9IwavhRRVcqXKYxPxVTPfS8C:1LOrS811PU6tzZQc/e6HCUNCCIzwUfK9

    Score
    1/10
    • Target

      BitcoinPrivateKeyFinder/BitcoinPrivateKeyFinder-installer.exe

    • Size

      2.3MB

    • MD5

      413a9080cdbb5e9dafc7a582bae52cfd

    • SHA1

      0558bdf441317f8a73969cb432fb5466cf5fdd3f

    • SHA256

      9896da019919c17a14328756877e84eb39accd4a5766381dfd4b2a750bd47924

    • SHA512

      455e7fb9a7409f9057b4c163bdef0ddb7b4ac6efa1f8e7073e605d0ba0e472e6ade7e551832b96772450fc0b2c9f13320f609beb602e54fcd21253cad780336e

    • SSDEEP

      49152:LHzVdJupvlgZ4qcNLquRd1DZFAkt8YHwMr6CtI89Q4wvj33Vo+N2oR/vrDNJS8q:PMvWmJNLquRDZWkt8YHwMr6CmZ4eT2W

    Score
    10/10
    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks