General

  • Target

    ce12d22fe44e8f4835a9aefbd56c364013aecc61871965d019cd1a59b88c0d05

  • Size

    123KB

  • Sample

    240715-n5962sybnf

  • MD5

    09ef848796a8a5c11597d68966f25f8b

  • SHA1

    e37febd0671d2474d177c9fc92bd9da74321baae

  • SHA256

    ce12d22fe44e8f4835a9aefbd56c364013aecc61871965d019cd1a59b88c0d05

  • SHA512

    6104a12e525a064b264547326711b06721f7df6d016e71a3f08f4f9c23f09668aa00234322ae069be561ebc95af9d7e0c55d9e0870a012cb8202093255141501

  • SSDEEP

    3072:J/vgIq1Z5tqs0SZAXicSSt3epV1bR4yc2G1XnyWR8nFe72:ZgIq5os0YAitStuVbR4ryWR8nFea

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      ce12d22fe44e8f4835a9aefbd56c364013aecc61871965d019cd1a59b88c0d05

    • Size

      123KB

    • MD5

      09ef848796a8a5c11597d68966f25f8b

    • SHA1

      e37febd0671d2474d177c9fc92bd9da74321baae

    • SHA256

      ce12d22fe44e8f4835a9aefbd56c364013aecc61871965d019cd1a59b88c0d05

    • SHA512

      6104a12e525a064b264547326711b06721f7df6d016e71a3f08f4f9c23f09668aa00234322ae069be561ebc95af9d7e0c55d9e0870a012cb8202093255141501

    • SSDEEP

      3072:J/vgIq1Z5tqs0SZAXicSSt3epV1bR4yc2G1XnyWR8nFe72:ZgIq5os0YAitStuVbR4ryWR8nFea

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks