General

  • Target

    9b8caec2b4b8425d22de2ab5842976a79a15da13ad61cd3b5e46642dc7bb105e

  • Size

    124KB

  • Sample

    240715-n6fc3awanl

  • MD5

    9ff263c954e1ccc63b58ff30352e1419

  • SHA1

    572806a7bcdf46b4697d2ac0f93fff02b33181fe

  • SHA256

    9b8caec2b4b8425d22de2ab5842976a79a15da13ad61cd3b5e46642dc7bb105e

  • SHA512

    1a391bb07ee281c331add3506e00cd7cd0343c8421f0ab0a54531c8a305289db3fa654d5c0409ed346b0adaf878d7016c663d55229b0e21330586364db8b1550

  • SSDEEP

    3072:t1GLD3+yUcBlIrj7K+BVe1URB9WrcP2xXf52:TKDOyUS2j+0tWwg0

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      9b8caec2b4b8425d22de2ab5842976a79a15da13ad61cd3b5e46642dc7bb105e

    • Size

      124KB

    • MD5

      9ff263c954e1ccc63b58ff30352e1419

    • SHA1

      572806a7bcdf46b4697d2ac0f93fff02b33181fe

    • SHA256

      9b8caec2b4b8425d22de2ab5842976a79a15da13ad61cd3b5e46642dc7bb105e

    • SHA512

      1a391bb07ee281c331add3506e00cd7cd0343c8421f0ab0a54531c8a305289db3fa654d5c0409ed346b0adaf878d7016c663d55229b0e21330586364db8b1550

    • SSDEEP

      3072:t1GLD3+yUcBlIrj7K+BVe1URB9WrcP2xXf52:TKDOyUS2j+0tWwg0

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks