General

  • Target

    67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9

  • Size

    122KB

  • Sample

    240715-n6fc3ayclb

  • MD5

    eb7d9928313c7c3e705a4142fd9197c1

  • SHA1

    35a63d632df0517b933cae02d73bcf9bdf07a146

  • SHA256

    67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9

  • SHA512

    b40727119f5e5feef6a20aa7e7239e35abf53b3c708a0212bc8c0bd139372f53faba3b72fc17f3aa6924b976bd172a3f9a100414fa2aeaa43dd83fdb20cdb807

  • SSDEEP

    3072:W89l7iMgbuV5/Y+4FFO8eO0gWqGNYPCpt67SYBp:hx43+womGNW5Sqp

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9

    • Size

      122KB

    • MD5

      eb7d9928313c7c3e705a4142fd9197c1

    • SHA1

      35a63d632df0517b933cae02d73bcf9bdf07a146

    • SHA256

      67c187b4e298ef953f83b42d474e878ceac0938e1ffc04f355cfad484c4a25b9

    • SHA512

      b40727119f5e5feef6a20aa7e7239e35abf53b3c708a0212bc8c0bd139372f53faba3b72fc17f3aa6924b976bd172a3f9a100414fa2aeaa43dd83fdb20cdb807

    • SSDEEP

      3072:W89l7iMgbuV5/Y+4FFO8eO0gWqGNYPCpt67SYBp:hx43+womGNW5Sqp

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks