General

  • Target

    40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015

  • Size

    126KB

  • Sample

    240715-n6bpwaybqe

  • MD5

    82fa316fb7b8215937138a7d303e2fda

  • SHA1

    d8680546a3313aeb661d38258b5a8f7053df0238

  • SHA256

    40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015

  • SHA512

    ca437bea39ece6180288e6c088a8ff12ba4f67f06dca363ce215e00e3987b3005ceb5c5faf08ef403264d241fe2fd846be3e9ba25ba6e1e32304fe5eb961b1ea

  • SSDEEP

    3072:ELRGt0UdNeBYiuu3b/YAzWuv+eXpoieDUnHiPoYBsADgTxC4gl:QRKd0qi1rYhumop5hCRsT

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015

    • Size

      126KB

    • MD5

      82fa316fb7b8215937138a7d303e2fda

    • SHA1

      d8680546a3313aeb661d38258b5a8f7053df0238

    • SHA256

      40ea4f8d7aaca428326ed2319c52b33eef0e56306ede7139f93ccec238fe7015

    • SHA512

      ca437bea39ece6180288e6c088a8ff12ba4f67f06dca363ce215e00e3987b3005ceb5c5faf08ef403264d241fe2fd846be3e9ba25ba6e1e32304fe5eb961b1ea

    • SSDEEP

      3072:ELRGt0UdNeBYiuu3b/YAzWuv+eXpoieDUnHiPoYBsADgTxC4gl:QRKd0qi1rYhumop5hCRsT

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks