General

  • Target

    093b44fcfd49eac72ab56082f375116c87359e93c7fbdbd45d3915fb4e651e68

  • Size

    124KB

  • Sample

    240715-n589rayblf

  • MD5

    1c97352f3daa54c2fd065b837967df38

  • SHA1

    651a8bd0d318dc1d6bb5939d17347b3d6ae69abb

  • SHA256

    093b44fcfd49eac72ab56082f375116c87359e93c7fbdbd45d3915fb4e651e68

  • SHA512

    cd4450613beee20f20d5fd3041f29142ef0a8f0154cfe024921a2f537f75a60b914e81df9130d049a811fc3e02c6ce9720545f4c76aaed6dd1d60c55dc75ac28

  • SSDEEP

    3072:tiz81rtYiYUrsCh6ynY2/WjvmEUqmdxclMNcpyGDkdV:tikrtYiY/CIynYUWqEFAx+4cp6

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      093b44fcfd49eac72ab56082f375116c87359e93c7fbdbd45d3915fb4e651e68

    • Size

      124KB

    • MD5

      1c97352f3daa54c2fd065b837967df38

    • SHA1

      651a8bd0d318dc1d6bb5939d17347b3d6ae69abb

    • SHA256

      093b44fcfd49eac72ab56082f375116c87359e93c7fbdbd45d3915fb4e651e68

    • SHA512

      cd4450613beee20f20d5fd3041f29142ef0a8f0154cfe024921a2f537f75a60b914e81df9130d049a811fc3e02c6ce9720545f4c76aaed6dd1d60c55dc75ac28

    • SSDEEP

      3072:tiz81rtYiYUrsCh6ynY2/WjvmEUqmdxclMNcpyGDkdV:tikrtYiY/CIynYUWqEFAx+4cp6

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks