General

  • Target

    dc4e5387a1cfd55ee92918c15d2d56846248bc5c01edf817d4e69fd385ac030c

  • Size

    124KB

  • Sample

    240715-n6e3aswamq

  • MD5

    2ec3ac9a88768c26d217c7eaffa2b188

  • SHA1

    ddbca0816fd0a8e586219197d12d8f659c8b193b

  • SHA256

    dc4e5387a1cfd55ee92918c15d2d56846248bc5c01edf817d4e69fd385ac030c

  • SHA512

    55d78ba1258ac3c6a64f06c88eb3c3c4bbc233b067e8f6d942fde879fc90eca256eb58837a9c749f9be453fce6fdbf16ef3033ccf3a9f5a7fe7b267d011815f7

  • SSDEEP

    3072:G9bmqNKs2hmGd5sXd+OLk7Shsf8c4f+waV/LNmkv:8mqNZ24GdOdHGD4fd8I

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      dc4e5387a1cfd55ee92918c15d2d56846248bc5c01edf817d4e69fd385ac030c

    • Size

      124KB

    • MD5

      2ec3ac9a88768c26d217c7eaffa2b188

    • SHA1

      ddbca0816fd0a8e586219197d12d8f659c8b193b

    • SHA256

      dc4e5387a1cfd55ee92918c15d2d56846248bc5c01edf817d4e69fd385ac030c

    • SHA512

      55d78ba1258ac3c6a64f06c88eb3c3c4bbc233b067e8f6d942fde879fc90eca256eb58837a9c749f9be453fce6fdbf16ef3033ccf3a9f5a7fe7b267d011815f7

    • SSDEEP

      3072:G9bmqNKs2hmGd5sXd+OLk7Shsf8c4f+waV/LNmkv:8mqNZ24GdOdHGD4fd8I

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks