General

  • Target

    19ab872f9ee6f0eb32021f3ea38be650N.exe

  • Size

    253KB

  • Sample

    240714-zhmysatdqm

  • MD5

    19ab872f9ee6f0eb32021f3ea38be650

  • SHA1

    45571c4510edd1a66c85d31af3bf1ebdd8fdaaa0

  • SHA256

    09c6ec0da25e5c798d40dae443066e44c38b13540cc8d4d4b652518d644922fc

  • SHA512

    57fcd657d7d21d8f8ec975daa09433eca76397b0c6c248c7ffe067fb99c1d620a1ae44f07c1cce118911f4963d3a7103314c60b617f9aa239937f32921dfa14d

  • SSDEEP

    3072:LqY1OlAf7aa7R62TvB/Ild78Xu1GEgTKy/O6FqMz5//JoJHyBUB:Lb5k2Lald78XjQyd0Yt/+KUB

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.176

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Targets

    • Target

      19ab872f9ee6f0eb32021f3ea38be650N.exe

    • Size

      253KB

    • MD5

      19ab872f9ee6f0eb32021f3ea38be650

    • SHA1

      45571c4510edd1a66c85d31af3bf1ebdd8fdaaa0

    • SHA256

      09c6ec0da25e5c798d40dae443066e44c38b13540cc8d4d4b652518d644922fc

    • SHA512

      57fcd657d7d21d8f8ec975daa09433eca76397b0c6c248c7ffe067fb99c1d620a1ae44f07c1cce118911f4963d3a7103314c60b617f9aa239937f32921dfa14d

    • SSDEEP

      3072:LqY1OlAf7aa7R62TvB/Ild78Xu1GEgTKy/O6FqMz5//JoJHyBUB:Lb5k2Lald78XjQyd0Yt/+KUB

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks