General

  • Target

    863ebe7a8a206c6dd7ce47325c0e9be0N.exe

  • Size

    2.6MB

  • Sample

    240906-gj96lazblj

  • MD5

    863ebe7a8a206c6dd7ce47325c0e9be0

  • SHA1

    ea5d0ad260baad066e57aeab8e9137b855c7cdc2

  • SHA256

    16adb542aeeffc26c763003a8425cf63817c6f89de7ca63b7b527f1eb1b96e25

  • SHA512

    8e32829fa492daa31665e6860c6b644894039e10b5f547bab167cb20f54de9ff9bcb29bc4e91e38d6809f62b3d8c034484ed4eaae2719ff073a126c99eebccac

  • SSDEEP

    49152:w0wjnJMOWh50kC1/dVFdx6e0EALKWVTffZiPAcRq6jHjcz8DzzxTMSwrL8t:w0GnJMOWPClFdx6e0EALKWVTffZiPAcL

Malware Config

Targets

    • Target

      863ebe7a8a206c6dd7ce47325c0e9be0N.exe

    • Size

      2.6MB

    • MD5

      863ebe7a8a206c6dd7ce47325c0e9be0

    • SHA1

      ea5d0ad260baad066e57aeab8e9137b855c7cdc2

    • SHA256

      16adb542aeeffc26c763003a8425cf63817c6f89de7ca63b7b527f1eb1b96e25

    • SHA512

      8e32829fa492daa31665e6860c6b644894039e10b5f547bab167cb20f54de9ff9bcb29bc4e91e38d6809f62b3d8c034484ed4eaae2719ff073a126c99eebccac

    • SSDEEP

      49152:w0wjnJMOWh50kC1/dVFdx6e0EALKWVTffZiPAcRq6jHjcz8DzzxTMSwrL8t:w0GnJMOWPClFdx6e0EALKWVTffZiPAcL

    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.