General

  • Target

    rrr.txt

  • Size

    78B

  • Sample

    230820-lzyjysfh9x

  • MD5

    d15daabad874b7be048651c540cdd8b1

  • SHA1

    255d9743ffb03abdae826f61e65f3ffeb9f5adc4

  • SHA256

    91b3f6f15b629ec1145fd59c9dfd40b736a9809b4b4cbf76bbabbf9ce4014912

  • SHA512

    d5ebf4e5f25703a7ddd0fdf6f30a4ffba94e61250c378f435ba389d39711def0a08219cac6c088da2c54bc059d647497fac15f2e7618f1523ed3737af7e3ac43

Malware Config

Targets

    • Target

      rrr.txt

    • Size

      78B

    • MD5

      d15daabad874b7be048651c540cdd8b1

    • SHA1

      255d9743ffb03abdae826f61e65f3ffeb9f5adc4

    • SHA256

      91b3f6f15b629ec1145fd59c9dfd40b736a9809b4b4cbf76bbabbf9ce4014912

    • SHA512

      d5ebf4e5f25703a7ddd0fdf6f30a4ffba94e61250c378f435ba389d39711def0a08219cac6c088da2c54bc059d647497fac15f2e7618f1523ed3737af7e3ac43

    • Strela

      An info stealer targeting mail credentials first seen in late 2022.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Privilege Escalation

Event Triggered Execution

1
T1546

Change Default File Association

1
T1546.001

Defense Evasion

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

System Information Discovery

1
T1082

Tasks