General

  • Target

    4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55

  • Size

    125KB

  • Sample

    240715-n59khsvhql

  • MD5

    2716fb510ab2b8c79f4431e16b0c4df5

  • SHA1

    aece9b0d66c9c93fb7288c1fb9c43751dcf4e99d

  • SHA256

    4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55

  • SHA512

    f3980f92dcdd1c502bb18481305d1b3de1bf9c1aab83a0a3f33d87e202b354bd8e580d1d5c0452c5e08c375730abdfce95341688186fbe01808efc535ef13c10

  • SSDEEP

    3072:xto/gN5wpgygOvZ5zfz5MYGU5nOVzO8YCCt7f62QdTE+:bo/gfYrb5MOxSl2D

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55

    • Size

      125KB

    • MD5

      2716fb510ab2b8c79f4431e16b0c4df5

    • SHA1

      aece9b0d66c9c93fb7288c1fb9c43751dcf4e99d

    • SHA256

      4cc821e53bb8c1d5ba86072e67350af29089510b8357cabfcc4ba330f731ca55

    • SHA512

      f3980f92dcdd1c502bb18481305d1b3de1bf9c1aab83a0a3f33d87e202b354bd8e580d1d5c0452c5e08c375730abdfce95341688186fbe01808efc535ef13c10

    • SSDEEP

      3072:xto/gN5wpgygOvZ5zfz5MYGU5nOVzO8YCCt7f62QdTE+:bo/gfYrb5MOxSl2D

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks