General

  • Target

    3a192da93c34317d20c1646f3bcdb690N.exe

  • Size

    890KB

  • Sample

    240823-kqlclaxbrj

  • MD5

    3a192da93c34317d20c1646f3bcdb690

  • SHA1

    e6f570866936bead9492fd3aaa054ab888375667

  • SHA256

    583ca7fcede98896533e02a88eff6a4576bedf0f619bc29d70525df2bc0cfe04

  • SHA512

    6f6a33d8c128b09ca80c471d1c252d6919d1cdfd83c303ba05781cac291934d877e727d1b90c78ec9a897a4915c70e2b796538d714bc1d4cf162259d31f49d78

  • SSDEEP

    24576:cFE//Tct4bOsbDxA7r9q0Zz4/jUFR5LFA4:mSVxcE0xF9

Malware Config

Targets

    • Target

      3a192da93c34317d20c1646f3bcdb690N.exe

    • Size

      890KB

    • MD5

      3a192da93c34317d20c1646f3bcdb690

    • SHA1

      e6f570866936bead9492fd3aaa054ab888375667

    • SHA256

      583ca7fcede98896533e02a88eff6a4576bedf0f619bc29d70525df2bc0cfe04

    • SHA512

      6f6a33d8c128b09ca80c471d1c252d6919d1cdfd83c303ba05781cac291934d877e727d1b90c78ec9a897a4915c70e2b796538d714bc1d4cf162259d31f49d78

    • SSDEEP

      24576:cFE//Tct4bOsbDxA7r9q0Zz4/jUFR5LFA4:mSVxcE0xF9

    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks