General

  • Target

    c0939571c0a1f3dd6b00851a9affeb70N.exe

  • Size

    260KB

  • Sample

    240715-l2j5ca1bmm

  • MD5

    c0939571c0a1f3dd6b00851a9affeb70

  • SHA1

    28ade9ff9ab37701dd48d3a4d7771d25668c3f5c

  • SHA256

    24a36dc957a9b7280664931649541063d09834907d399d63a2b0ca42c4a301ed

  • SHA512

    57d9bdaa73fcb85cc38e8c9d5dec4268e5393cf0ac6d0b15c6fd225510de7ed2825b1f7b5ace4e5d00c431419f9bbb639f4ec09b7763f64387cc977221e4bb4f

  • SSDEEP

    6144:YkIOSuPT9KTR2OoHH/DcRez7ksB/apsssKttUB:YibTAR2nr40tCiB

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.176

Attributes
  • url_path

    /server.php

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537

Targets

    • Target

      c0939571c0a1f3dd6b00851a9affeb70N.exe

    • Size

      260KB

    • MD5

      c0939571c0a1f3dd6b00851a9affeb70

    • SHA1

      28ade9ff9ab37701dd48d3a4d7771d25668c3f5c

    • SHA256

      24a36dc957a9b7280664931649541063d09834907d399d63a2b0ca42c4a301ed

    • SHA512

      57d9bdaa73fcb85cc38e8c9d5dec4268e5393cf0ac6d0b15c6fd225510de7ed2825b1f7b5ace4e5d00c431419f9bbb639f4ec09b7763f64387cc977221e4bb4f

    • SSDEEP

      6144:YkIOSuPT9KTR2OoHH/DcRez7ksB/apsssKttUB:YibTAR2nr40tCiB

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks