General

  • Target

    run.ps1

  • Size

    148B

  • Sample

    240705-g11y9atelq

  • MD5

    875745fc114004987f5921b8b7f632be

  • SHA1

    421f0a88583c5d3b45d9daf71f287184b6ff149d

  • SHA256

    93f7206c22debd87a0ba1fe9714b5439a3838ec85e794abf09d1f402b70c7ad4

  • SHA512

    190dd20b835dc6cc5b9ff3cebf820439f017d964cabebdc9cd0fdb86a9ea169fc45dc1e176f1781c0a109484e245353ba8e02b9c9ffe322dff4e9fb36013ce56

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.254.97.190:2024/test.txt

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/xmrig.zip

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/MoneroOcean/xmrig_setup/master/nssm.zip

Targets

    • Target

      run.ps1

    • Size

      148B

    • MD5

      875745fc114004987f5921b8b7f632be

    • SHA1

      421f0a88583c5d3b45d9daf71f287184b6ff149d

    • SHA256

      93f7206c22debd87a0ba1fe9714b5439a3838ec85e794abf09d1f402b70c7ad4

    • SHA512

      190dd20b835dc6cc5b9ff3cebf820439f017d964cabebdc9cd0fdb86a9ea169fc45dc1e176f1781c0a109484e245353ba8e02b9c9ffe322dff4e9fb36013ce56

    • XMRig Miner payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Blocklisted process makes network request

    • Stops running service(s)

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

System Services

1
T1569

Service Execution

1
T1569.002

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Impair Defenses

1
T1562

Command and Control

Web Service

1
T1102

Impact

Service Stop

1
T1489

Tasks