General

  • Target

    85d1c47e6dd51fbf4be61d8f62887d60N.exe

  • Size

    123KB

  • Sample

    240715-fhp9csyelr

  • MD5

    85d1c47e6dd51fbf4be61d8f62887d60

  • SHA1

    b3f75468870f6f0718fd8ac7cd5d956754aedfe6

  • SHA256

    719fd48cc14bc3c4b45308f58d9c4848d4ab3f6b91cd9d51c2da82ea65a22f5a

  • SHA512

    d1049e0abb9b3bf0f686ba8beb8b9899ac4fb90bf51e61b212bdd8fec5b0482532c77bb2f50ec43b80cdf0b5779b7058c0485a4b624e792b5bd00578fd1c4afb

  • SSDEEP

    3072:DYFCV2gQAp2CQPKByIdTJCZV9OtRj2QgDhXO8IktjP:eCVqAsRPvItJCZutAQWWA

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      85d1c47e6dd51fbf4be61d8f62887d60N.exe

    • Size

      123KB

    • MD5

      85d1c47e6dd51fbf4be61d8f62887d60

    • SHA1

      b3f75468870f6f0718fd8ac7cd5d956754aedfe6

    • SHA256

      719fd48cc14bc3c4b45308f58d9c4848d4ab3f6b91cd9d51c2da82ea65a22f5a

    • SHA512

      d1049e0abb9b3bf0f686ba8beb8b9899ac4fb90bf51e61b212bdd8fec5b0482532c77bb2f50ec43b80cdf0b5779b7058c0485a4b624e792b5bd00578fd1c4afb

    • SSDEEP

      3072:DYFCV2gQAp2CQPKByIdTJCZV9OtRj2QgDhXO8IktjP:eCVqAsRPvItJCZutAQWWA

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks