General

  • Target

    software.exe

  • Size

    2.1MB

  • Sample

    250203-a6gz1awlej

  • MD5

    6648600886e0f5d8724a40f3464ab25f

  • SHA1

    d948a4a0013c122aa39f000756af32bf539407be

  • SHA256

    61bb0d4b9f339c0a84cbf52599127b716209f54599b023bdab0a75a062dfe678

  • SHA512

    11a9df844e7d2f5fcbbb7bb7e6b9554446cfc752d73504dc329fe7c50aeb5d4141ab1af825c1b14da4f386deaa6ddcfdb5ec7149a437c3c8e8a513f0665b5b0a

  • SSDEEP

    49152:d4N7/8t5eYbaB809DhpravdvAtm6X/rxfAm1Oa8kbsb190yIV72:Kk/aB807pravdgX/rxfRYa8kbA0F72

Malware Config

Targets

    • Target

      software.exe

    • Size

      2.1MB

    • MD5

      6648600886e0f5d8724a40f3464ab25f

    • SHA1

      d948a4a0013c122aa39f000756af32bf539407be

    • SHA256

      61bb0d4b9f339c0a84cbf52599127b716209f54599b023bdab0a75a062dfe678

    • SHA512

      11a9df844e7d2f5fcbbb7bb7e6b9554446cfc752d73504dc329fe7c50aeb5d4141ab1af825c1b14da4f386deaa6ddcfdb5ec7149a437c3c8e8a513f0665b5b0a

    • SSDEEP

      49152:d4N7/8t5eYbaB809DhpravdvAtm6X/rxfAm1Oa8kbsb190yIV72:Kk/aB807pravdgX/rxfRYa8kbA0F72

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks