General

  • Target

    0353c6b05ff9037eb4ec3616165f168e7557ef80884ce9c8447fa3d2a396cff0

  • Size

    124KB

  • Sample

    240715-n6efrsyckf

  • MD5

    e5050306d4ba1c518f61e0fb7d63e157

  • SHA1

    ff8dd39c5f35dce77d5dbeaa47ef4a13ef5b0bac

  • SHA256

    0353c6b05ff9037eb4ec3616165f168e7557ef80884ce9c8447fa3d2a396cff0

  • SHA512

    e20ecd89dd81a3490f93e3d1b2dfb0ba0b40d2f1146bcec9cfaf384a870fea72e7e7ca344311f6140ffd9f6371cb7786161a201b8bc548cb7b5c6d3bcf46d495

  • SSDEEP

    3072:8JBHNUbdqHKbIptEGUkycDhBhOXWQh8R0Rzb:SBHNoHbMokyUhBwbhDRz

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      0353c6b05ff9037eb4ec3616165f168e7557ef80884ce9c8447fa3d2a396cff0

    • Size

      124KB

    • MD5

      e5050306d4ba1c518f61e0fb7d63e157

    • SHA1

      ff8dd39c5f35dce77d5dbeaa47ef4a13ef5b0bac

    • SHA256

      0353c6b05ff9037eb4ec3616165f168e7557ef80884ce9c8447fa3d2a396cff0

    • SHA512

      e20ecd89dd81a3490f93e3d1b2dfb0ba0b40d2f1146bcec9cfaf384a870fea72e7e7ca344311f6140ffd9f6371cb7786161a201b8bc548cb7b5c6d3bcf46d495

    • SSDEEP

      3072:8JBHNUbdqHKbIptEGUkycDhBhOXWQh8R0Rzb:SBHNoHbMokyUhBwbhDRz

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks