General

  • Target

    cba00e5474b1b2231ba26eb9f6d0f450N.exe

  • Size

    124KB

  • Sample

    240715-m6vmbatbjq

  • MD5

    cba00e5474b1b2231ba26eb9f6d0f450

  • SHA1

    96d16abb7c0e53f0b488cbae27b796925a477df0

  • SHA256

    8006168384e093571afd279e2e23885528162efd2a7e5f7706337544366a50c4

  • SHA512

    533bf2a9e853fb276e1153d3bf8377c8feadc817bc6647aa8328145c089310dea0e1a578d47ec5ed1fccfec10c279212a267337d0b7f38fdd55e51cb0ddd9897

  • SSDEEP

    3072:9uW96e2V7/JDXPLH3SHR6eVjhtRYQ989GRGePEaCK78KpLSWaQ9P4lX9:ahZ3SHEahtufad7jB

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      cba00e5474b1b2231ba26eb9f6d0f450N.exe

    • Size

      124KB

    • MD5

      cba00e5474b1b2231ba26eb9f6d0f450

    • SHA1

      96d16abb7c0e53f0b488cbae27b796925a477df0

    • SHA256

      8006168384e093571afd279e2e23885528162efd2a7e5f7706337544366a50c4

    • SHA512

      533bf2a9e853fb276e1153d3bf8377c8feadc817bc6647aa8328145c089310dea0e1a578d47ec5ed1fccfec10c279212a267337d0b7f38fdd55e51cb0ddd9897

    • SSDEEP

      3072:9uW96e2V7/JDXPLH3SHR6eVjhtRYQ989GRGePEaCK78KpLSWaQ9P4lX9:ahZ3SHEahtufad7jB

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks