General

  • Target

    863ebe7a8a206c6dd7ce47325c0e9be0N.exe

  • Size

    2.6MB

  • Sample

    240906-gj96lazblj

  • MD5

    863ebe7a8a206c6dd7ce47325c0e9be0

  • SHA1

    ea5d0ad260baad066e57aeab8e9137b855c7cdc2

  • SHA256

    16adb542aeeffc26c763003a8425cf63817c6f89de7ca63b7b527f1eb1b96e25

  • SHA512

    8e32829fa492daa31665e6860c6b644894039e10b5f547bab167cb20f54de9ff9bcb29bc4e91e38d6809f62b3d8c034484ed4eaae2719ff073a126c99eebccac

  • SSDEEP

    49152:w0wjnJMOWh50kC1/dVFdx6e0EALKWVTffZiPAcRq6jHjcz8DzzxTMSwrL8t:w0GnJMOWPClFdx6e0EALKWVTffZiPAcL

Malware Config

Targets

    • Target

      863ebe7a8a206c6dd7ce47325c0e9be0N.exe

    • Size

      2.6MB

    • MD5

      863ebe7a8a206c6dd7ce47325c0e9be0

    • SHA1

      ea5d0ad260baad066e57aeab8e9137b855c7cdc2

    • SHA256

      16adb542aeeffc26c763003a8425cf63817c6f89de7ca63b7b527f1eb1b96e25

    • SHA512

      8e32829fa492daa31665e6860c6b644894039e10b5f547bab167cb20f54de9ff9bcb29bc4e91e38d6809f62b3d8c034484ed4eaae2719ff073a126c99eebccac

    • SSDEEP

      49152:w0wjnJMOWh50kC1/dVFdx6e0EALKWVTffZiPAcRq6jHjcz8DzzxTMSwrL8t:w0GnJMOWPClFdx6e0EALKWVTffZiPAcL

    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks