General

  • Target

    e223dddd43b7d1ab04e9b01a4126d126df4ea4a42d1f9a9561225dfe3db447e7

  • Size

    123KB

  • Sample

    240715-n6cxyawalj

  • MD5

    c57057ed6d4383a8f42cb07c4d8a4bb8

  • SHA1

    1752ebc1fdc359e98193b05149199d7990aeb3f3

  • SHA256

    e223dddd43b7d1ab04e9b01a4126d126df4ea4a42d1f9a9561225dfe3db447e7

  • SHA512

    ecd9ef4cb48a82bac10ad46642591854a290cb252bcaa89debeebb65a2d4cb0238369c75df9136b57f955b0e7639279d78bc0920636b2840e16f156ee43cd8b2

  • SSDEEP

    3072:K/RHTU/Od6m842vg2xxCLRofI+dZutSTC0i4MoJYPp:lWJ8TukCWJ

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      e223dddd43b7d1ab04e9b01a4126d126df4ea4a42d1f9a9561225dfe3db447e7

    • Size

      123KB

    • MD5

      c57057ed6d4383a8f42cb07c4d8a4bb8

    • SHA1

      1752ebc1fdc359e98193b05149199d7990aeb3f3

    • SHA256

      e223dddd43b7d1ab04e9b01a4126d126df4ea4a42d1f9a9561225dfe3db447e7

    • SHA512

      ecd9ef4cb48a82bac10ad46642591854a290cb252bcaa89debeebb65a2d4cb0238369c75df9136b57f955b0e7639279d78bc0920636b2840e16f156ee43cd8b2

    • SSDEEP

      3072:K/RHTU/Od6m842vg2xxCLRofI+dZutSTC0i4MoJYPp:lWJ8TukCWJ

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks