General

  • Target

    34ccd00332b5e2467ef3816e61824970N.exe

  • Size

    2.0MB

  • Sample

    240722-av97eavfnn

  • MD5

    34ccd00332b5e2467ef3816e61824970

  • SHA1

    b09da92aa11b3d5535e1cae3ac82b8172959957e

  • SHA256

    d9be83a8caaa9c069abd343259d04e569f8e3d0d2f02c5771982217804df9989

  • SHA512

    04e2b8e868239e73a2d41519c3cb514aa889654e7e0db23e5c0975e833af70069e680fcda5a449da6dc165d5609db8b5721e3dbe8cc795127437330734a5f624

  • SSDEEP

    49152:ROdWCCi7/raU56uL3pgrCEd2hXcfFfikz23Xs3:RWWBib356utgX

Malware Config

Targets

    • Target

      34ccd00332b5e2467ef3816e61824970N.exe

    • Size

      2.0MB

    • MD5

      34ccd00332b5e2467ef3816e61824970

    • SHA1

      b09da92aa11b3d5535e1cae3ac82b8172959957e

    • SHA256

      d9be83a8caaa9c069abd343259d04e569f8e3d0d2f02c5771982217804df9989

    • SHA512

      04e2b8e868239e73a2d41519c3cb514aa889654e7e0db23e5c0975e833af70069e680fcda5a449da6dc165d5609db8b5721e3dbe8cc795127437330734a5f624

    • SSDEEP

      49152:ROdWCCi7/raU56uL3pgrCEd2hXcfFfikz23Xs3:RWWBib356utgX

    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks