General

  • Target

    c452c3d5cef487a8392af30606d5a3bf1489d87b1078e8e5a0b94a9b92b0f2faN

  • Size

    1.4MB

  • Sample

    241018-twkgxswgld

  • MD5

    38e97103d1a70d7a0e328acaac73ef60

  • SHA1

    a1a30c258ef4b77a0c8514d67fdf4e1bfa73f752

  • SHA256

    c452c3d5cef487a8392af30606d5a3bf1489d87b1078e8e5a0b94a9b92b0f2fa

  • SHA512

    8bf454ee3c352ac4c5602d7d62fd876284735a4533404156ceee2c434d77f83c3b1960fcaa9884df6fcf812f151ddfc56057f6f9f1a9216f20922a83bb6a927f

  • SSDEEP

    24576:JanwhSe11QSONCpGJCjETPlGC78XIHbAYhbcj9iPEt/xfn1atMi:knw9oUUEEDlGUJ8Y9c3t/Hayi

Malware Config

Targets

    • Target

      c452c3d5cef487a8392af30606d5a3bf1489d87b1078e8e5a0b94a9b92b0f2faN

    • Size

      1.4MB

    • MD5

      38e97103d1a70d7a0e328acaac73ef60

    • SHA1

      a1a30c258ef4b77a0c8514d67fdf4e1bfa73f752

    • SHA256

      c452c3d5cef487a8392af30606d5a3bf1489d87b1078e8e5a0b94a9b92b0f2fa

    • SHA512

      8bf454ee3c352ac4c5602d7d62fd876284735a4533404156ceee2c434d77f83c3b1960fcaa9884df6fcf812f151ddfc56057f6f9f1a9216f20922a83bb6a927f

    • SSDEEP

      24576:JanwhSe11QSONCpGJCjETPlGC78XIHbAYhbcj9iPEt/xfn1atMi:knw9oUUEEDlGUJ8Y9c3t/Hayi

    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks