General

  • Target

    5c4bbed734b57d3c515ea1c615e80f6e869de7e8d72ce1943b29799f3406fa3b

  • Size

    136KB

  • MD5

    af6b959cfd793df22e5d7eaf2f456e9a

  • SHA1

    507794208eba6387d0cb3a98d0bb83dfa1d9bd6d

  • SHA256

    5c4bbed734b57d3c515ea1c615e80f6e869de7e8d72ce1943b29799f3406fa3b

  • SHA512

    f40f6c4fc7dc05e4ba12baa632c0b9087d019973ee060287bc14f3f360b1b2c6cdb71b0efdff331bb2975024a36dd59b46fd75131bfe56e2123663483347b14e

  • SSDEEP

    3072:E57QrRdArDw3RRQ0DnnmvxCQkd9F9pqd:EmrRdArDw30Snnmv01pq

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.13

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family

Files

  • 5c4bbed734b57d3c515ea1c615e80f6e869de7e8d72ce1943b29799f3406fa3b