General

  • Target

    3bf94e0f7a176092c1125c156711da8cb4debeab0530ad5e5bda2fdf8211c62a

  • Size

    127KB

  • Sample

    240715-n58m8aybke

  • MD5

    dc41d58158d35600f3147ed2c7d67148

  • SHA1

    2eef20c4fa4ff9b6aab5205b8b4a2354ac4cf531

  • SHA256

    3bf94e0f7a176092c1125c156711da8cb4debeab0530ad5e5bda2fdf8211c62a

  • SHA512

    03e87dc0bb85944297776b8efe7f7b9f155fe0979e427a300178ea2d479fdfea2f0c062e5ceaf7f921edcd90672a7387a929026ed5fb39a6f1d4714da0ec1b72

  • SSDEEP

    3072:rsf4zW01LCpFqEgul9RbRWyI3S0U6yopHVVgW5x:XzEFqZunyyv63F5

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      3bf94e0f7a176092c1125c156711da8cb4debeab0530ad5e5bda2fdf8211c62a

    • Size

      127KB

    • MD5

      dc41d58158d35600f3147ed2c7d67148

    • SHA1

      2eef20c4fa4ff9b6aab5205b8b4a2354ac4cf531

    • SHA256

      3bf94e0f7a176092c1125c156711da8cb4debeab0530ad5e5bda2fdf8211c62a

    • SHA512

      03e87dc0bb85944297776b8efe7f7b9f155fe0979e427a300178ea2d479fdfea2f0c062e5ceaf7f921edcd90672a7387a929026ed5fb39a6f1d4714da0ec1b72

    • SSDEEP

      3072:rsf4zW01LCpFqEgul9RbRWyI3S0U6yopHVVgW5x:XzEFqZunyyv63F5

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks