General

  • Target

    e99109743db0155d33c96a42001a242d78222b3d083ea8b1fa92264ab2688c57

  • Size

    1MB

  • Sample

    230921-qtbkfsac43

  • MD5

    6e545069de57213908cdf6ef178a69d8

  • SHA1

    a0de4b5882325fa1a01438173e680b0a49f270d1

  • SHA256

    e99109743db0155d33c96a42001a242d78222b3d083ea8b1fa92264ab2688c57

  • SHA512

    c7babe2e6a7a0c811ae82f8a44a610ecffb0f31b118f66314a10ac815fe890e41cc8866ed9969c8579a3f2898c94ad3dd78e0b54a7a3150f812daee1f14bb7ce

  • SSDEEP

    49152:YnoKk8RDu6M3GGAK3pdowhP4MRQE+iaHDiOalbVFNX1:XKkMUAKrhPQE+XHDiOaPFH

Score
10/10

Malware Config

Extracted

Family

strela

C2

193.109.85.77

Targets

    • Target

      FACTURA_13217755.js

    • Size

      4MB

    • MD5

      ece379842cdedea54b6d855ae2beb598

    • SHA1

      fdb27a8925be1800e302fbde0a0945952870e6b8

    • SHA256

      c87aa0f9eb036583bc606df9101ef48c00a04756de36dcea895413244fa0afc3

    • SHA512

      057a1650e9294472c937fdb10825a991f7c96a286559cc1ac7466d8f93903bc47ba0ba379001dc874b26e987033b41a7416d063942fa3cb664e615b80967f577

    • SSDEEP

      49152:8ggcY+kdfBXhwOh4haxxIWzRpc1HySaI7x/ByIq7omxmf6YJ659wKO/m9KnrYXc4:Dch

    Score
    10/10
    • Strela

      An info stealer targeting mail credentials first seen in late 2022.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks