General

  • Target

    1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135

  • Size

    124KB

  • Sample

    240715-n589rayblc

  • MD5

    714dd033be398e9c7e6841cbc0f4063e

  • SHA1

    8a0579fcd8fbb43127b18daac2353c6105c8c6db

  • SHA256

    1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135

  • SHA512

    db5451766c53b9be32561eb34e757fc3ac99cb71952e2caacce75b31d2fd2aa46d73bd7ddfd092d156ac509fe6f8942f9b90d2820fce7cb8a30da4df96c76aae

  • SSDEEP

    3072:gDy4gTgT89thrxnBy4uF4qNx2LmkbJki6U1NW:3rTxfBy4uF4qqLmkb+Y1N

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135

    • Size

      124KB

    • MD5

      714dd033be398e9c7e6841cbc0f4063e

    • SHA1

      8a0579fcd8fbb43127b18daac2353c6105c8c6db

    • SHA256

      1d7032a144148e369260ca8d8e24eae22febee14af72b2cfe088fcde2365c135

    • SHA512

      db5451766c53b9be32561eb34e757fc3ac99cb71952e2caacce75b31d2fd2aa46d73bd7ddfd092d156ac509fe6f8942f9b90d2820fce7cb8a30da4df96c76aae

    • SSDEEP

      3072:gDy4gTgT89thrxnBy4uF4qNx2LmkbJki6U1NW:3rTxfBy4uF4qqLmkb+Y1N

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks