General

  • Target

    NanoCore 1.2.2.0_Fixed_Cracked By Alcatraz3222.zip

  • Size

    10.1MB

  • Sample

    250213-dd9fbssmhy

  • MD5

    1333e9bdcacf242b919d892883e8562a

  • SHA1

    457dad60c79fdc637e2ba53c6a993ae48073d0a8

  • SHA256

    517f321c489f68449571c735e9c1cbae5d3241a6872972b687be97d2b5d04903

  • SHA512

    7d64aec16605e82e865bb48d87ab6d8eae815ed2aaa836b5fb817d3220ad0ebb9f564148ab23b374bbc268f404765f2cd99e53859fe27d73f73b66616317e5ff

  • SSDEEP

    196608:uwAF2RqmtB/JR7WXFvDfZEdy5DoyRc8HIDftjc5e6sajAwkr+T58FezFc0J:uwAgLBOFLfZEdwoyRLoDa5zN4izF3

Malware Config

Targets

    • Target

      NanoCore 1.2.2.0_Fixed_Cracked By Alcatraz3222.zip

    • Size

      10.1MB

    • MD5

      1333e9bdcacf242b919d892883e8562a

    • SHA1

      457dad60c79fdc637e2ba53c6a993ae48073d0a8

    • SHA256

      517f321c489f68449571c735e9c1cbae5d3241a6872972b687be97d2b5d04903

    • SHA512

      7d64aec16605e82e865bb48d87ab6d8eae815ed2aaa836b5fb817d3220ad0ebb9f564148ab23b374bbc268f404765f2cd99e53859fe27d73f73b66616317e5ff

    • SSDEEP

      196608:uwAF2RqmtB/JR7WXFvDfZEdy5DoyRc8HIDftjc5e6sajAwkr+T58FezFc0J:uwAgLBOFLfZEdwoyRLoDa5zN4izF3

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Indicator Removal: Clear Persistence

      Clear artifacts associated with previously established persistence like scheduletasks on a host.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks