General

  • Target

    4dbd72a82e29fa928de1264a5d64c3797c37e4a31fa7852be01e0b41d277c432

  • Size

    123KB

  • Sample

    240715-n53f7syamh

  • MD5

    f92642dbabe2991362622ab0ce361009

  • SHA1

    9790232252d71ea303d1ed825d932e6ee304ce23

  • SHA256

    4dbd72a82e29fa928de1264a5d64c3797c37e4a31fa7852be01e0b41d277c432

  • SHA512

    0fb39983607fa6b86ea5a5f064e95b06b452d92300c9d18e6821b6f797be58e1091fea2d966847b5319ddcd29ce09f6cb85a5157626da46f9612a6bd1b68b45b

  • SSDEEP

    3072:hwv6Qn8Lyhretb8WNn/bf9qh1EdJPgnXSQ:2v6NLy0NPn79MiJPgnXS

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      4dbd72a82e29fa928de1264a5d64c3797c37e4a31fa7852be01e0b41d277c432

    • Size

      123KB

    • MD5

      f92642dbabe2991362622ab0ce361009

    • SHA1

      9790232252d71ea303d1ed825d932e6ee304ce23

    • SHA256

      4dbd72a82e29fa928de1264a5d64c3797c37e4a31fa7852be01e0b41d277c432

    • SHA512

      0fb39983607fa6b86ea5a5f064e95b06b452d92300c9d18e6821b6f797be58e1091fea2d966847b5319ddcd29ce09f6cb85a5157626da46f9612a6bd1b68b45b

    • SSDEEP

      3072:hwv6Qn8Lyhretb8WNn/bf9qh1EdJPgnXSQ:2v6NLy0NPn79MiJPgnXS

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.