General

  • Target

    97e3de9126de633d04d70fae0d802dca68fbd70e7a60b754ae432e2681c85870

  • Size

    2.6MB

  • Sample

    240805-ax9nna1flp

  • MD5

    98d38e26973532c097c4992693140f12

  • SHA1

    2545e1ad780ff81c9e8cfe84039150918909e849

  • SHA256

    97e3de9126de633d04d70fae0d802dca68fbd70e7a60b754ae432e2681c85870

  • SHA512

    2e6837a6e7fba8bfeddbf3dff5c60fc56fa4ef8847f4e22104a182e55bf8889012cf97d7fcf572fe7ad881425784f847ff8494dc707f91d099022c0f12f41b2a

  • SSDEEP

    49152:w0wjnJMOWh50kC1/dVFdx6e0EALKWVTffZiPAcRq6jHjcz8DzzxTMSwrLH7jym:w0GnJMOWPClFdx6e0EALKWVTffZiPAco

Malware Config

Targets

    • Target

      97e3de9126de633d04d70fae0d802dca68fbd70e7a60b754ae432e2681c85870

    • Size

      2.6MB

    • MD5

      98d38e26973532c097c4992693140f12

    • SHA1

      2545e1ad780ff81c9e8cfe84039150918909e849

    • SHA256

      97e3de9126de633d04d70fae0d802dca68fbd70e7a60b754ae432e2681c85870

    • SHA512

      2e6837a6e7fba8bfeddbf3dff5c60fc56fa4ef8847f4e22104a182e55bf8889012cf97d7fcf572fe7ad881425784f847ff8494dc707f91d099022c0f12f41b2a

    • SSDEEP

      49152:w0wjnJMOWh50kC1/dVFdx6e0EALKWVTffZiPAcRq6jHjcz8DzzxTMSwrLH7jym:w0GnJMOWPClFdx6e0EALKWVTffZiPAco

    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks