General

  • Target

    3d23fe2a674e090f3325a09c5b455c3be0f4e611c097026a723cdf068ed47a15

  • Size

    123KB

  • Sample

    240715-n6bpwaybqc

  • MD5

    68cf1c8b2dc82bc0dbe618453f3fa665

  • SHA1

    628ba5e9e2a3931a09828bb7369cca636a96c2cd

  • SHA256

    3d23fe2a674e090f3325a09c5b455c3be0f4e611c097026a723cdf068ed47a15

  • SHA512

    48b6b433ffddac0c1f871323b0bb357b92df7eca95863e6f2442c3124f3b61d8cd9a0926a4f6b3c5e3262169be452eda5d8fbb190dd4e0ae7c6345e5a9125cb0

  • SSDEEP

    3072:/4VQdB9BnQGsVHRK/VQRSxnBVRwAIGNuqfyPa:/4anRJ8HRK/KQBVBwuyi

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      3d23fe2a674e090f3325a09c5b455c3be0f4e611c097026a723cdf068ed47a15

    • Size

      123KB

    • MD5

      68cf1c8b2dc82bc0dbe618453f3fa665

    • SHA1

      628ba5e9e2a3931a09828bb7369cca636a96c2cd

    • SHA256

      3d23fe2a674e090f3325a09c5b455c3be0f4e611c097026a723cdf068ed47a15

    • SHA512

      48b6b433ffddac0c1f871323b0bb357b92df7eca95863e6f2442c3124f3b61d8cd9a0926a4f6b3c5e3262169be452eda5d8fbb190dd4e0ae7c6345e5a9125cb0

    • SSDEEP

      3072:/4VQdB9BnQGsVHRK/VQRSxnBVRwAIGNuqfyPa:/4anRJ8HRK/KQBVBwuyi

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks