General

  • Target

    2025-03-30_89b72f237138fba0300c8d8b4df90923_aspxspy_black-basta_ezcob_xmrig

  • Size

    5.0MB

  • Sample

    250330-tdvvyatry6

  • MD5

    89b72f237138fba0300c8d8b4df90923

  • SHA1

    fb8a8f5bb5446e5f7d026c69ead34ce609fd7e6d

  • SHA256

    0a670c13ec5828acf52a9327787e38d884633f656e1a319233a8c44cc74d72e4

  • SHA512

    7b3ae1ee2dd3bf1db48337596614a7db4a747fda8812fc6b63d17ae5e24e97b8188840eeba247eeb36a9e10dc3a10ea1c0a094c985ac99d95f4bc0618c9ced91

  • SSDEEP

    98304:z1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHr8E:zbBeSFkC

Malware Config

Targets

    • Target

      2025-03-30_89b72f237138fba0300c8d8b4df90923_aspxspy_black-basta_ezcob_xmrig

    • Size

      5.0MB

    • MD5

      89b72f237138fba0300c8d8b4df90923

    • SHA1

      fb8a8f5bb5446e5f7d026c69ead34ce609fd7e6d

    • SHA256

      0a670c13ec5828acf52a9327787e38d884633f656e1a319233a8c44cc74d72e4

    • SHA512

      7b3ae1ee2dd3bf1db48337596614a7db4a747fda8812fc6b63d17ae5e24e97b8188840eeba247eeb36a9e10dc3a10ea1c0a094c985ac99d95f4bc0618c9ced91

    • SSDEEP

      98304:z1ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHr8E:zbBeSFkC

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks