General

  • Target

    5c18328ba684ecb35c13c6340e2b14a0N.exe

  • Size

    262KB

  • Sample

    240715-b8b27sselk

  • MD5

    5c18328ba684ecb35c13c6340e2b14a0

  • SHA1

    78bfa2e05e080de371fdf98d2d0afa911ef2c13e

  • SHA256

    11c21f1969a2531056c9436ed8da8e16f02b8778bf80216aac1ee63a45f53004

  • SHA512

    700c193f304eda875e5f89e859c0a20d0abb831597f73b6d9c5dcc6ba0b7c5a02518b009102537e1e96384e4a4789e7efe2f11fc40848b7ee5ca3f374d8f55a3

  • SSDEEP

    6144:ewGxLd1kfZ1v1v7touEuEmpji/UOQhU09t96T/AP67UkfiKUB:UxLgf/v1vWxuEwu0r8rA0UkadB

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.176

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Targets

    • Target

      5c18328ba684ecb35c13c6340e2b14a0N.exe

    • Size

      262KB

    • MD5

      5c18328ba684ecb35c13c6340e2b14a0

    • SHA1

      78bfa2e05e080de371fdf98d2d0afa911ef2c13e

    • SHA256

      11c21f1969a2531056c9436ed8da8e16f02b8778bf80216aac1ee63a45f53004

    • SHA512

      700c193f304eda875e5f89e859c0a20d0abb831597f73b6d9c5dcc6ba0b7c5a02518b009102537e1e96384e4a4789e7efe2f11fc40848b7ee5ca3f374d8f55a3

    • SSDEEP

      6144:ewGxLd1kfZ1v1v7touEuEmpji/UOQhU09t96T/AP67UkfiKUB:UxLgf/v1vWxuEwu0r8rA0UkadB

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks