General

  • Target

    472e93c2f9b9cfc56824772f741776c93f198c91bb0cb007f0eac7c7ab6bf666

  • Size

    3.1MB

  • Sample

    240806-z3pccavamg

  • MD5

    262ae7119f7a565b827edbe4f538ba84

  • SHA1

    c9c85bc8b8113fd335335f495bd630c38f81f471

  • SHA256

    472e93c2f9b9cfc56824772f741776c93f198c91bb0cb007f0eac7c7ab6bf666

  • SHA512

    676a9f22ba4a8a3faa9366be1045eb842adaac28240a11b35460153463fc72d72635d5056f4416c896406ef3dd91ca63de302d7c00b81d9843766ae7bca329b5

  • SSDEEP

    98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWT:7bBeSFk/

Malware Config

Targets

    • Target

      472e93c2f9b9cfc56824772f741776c93f198c91bb0cb007f0eac7c7ab6bf666

    • Size

      3.1MB

    • MD5

      262ae7119f7a565b827edbe4f538ba84

    • SHA1

      c9c85bc8b8113fd335335f495bd630c38f81f471

    • SHA256

      472e93c2f9b9cfc56824772f741776c93f198c91bb0cb007f0eac7c7ab6bf666

    • SHA512

      676a9f22ba4a8a3faa9366be1045eb842adaac28240a11b35460153463fc72d72635d5056f4416c896406ef3dd91ca63de302d7c00b81d9843766ae7bca329b5

    • SSDEEP

      98304:71ONtyBeSFkXV1etEKLlWUTOfeiRA2R76zHrWT:7bBeSFk/

    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks