General

  • Target

    0dd9ffa06dfd4982c75dd5e43fe9f176bcf5bbda5960107c0f4ea3e31af56ce3

  • Size

    124KB

  • Sample

    240715-n6g7naycnc

  • MD5

    ffc1187f36fc780ea47cf56b1b452086

  • SHA1

    9ee62b569850a2d5df392333048d6aef42087895

  • SHA256

    0dd9ffa06dfd4982c75dd5e43fe9f176bcf5bbda5960107c0f4ea3e31af56ce3

  • SHA512

    db5d26d8230d5b519317c260ac8c749b2376274cf1d12be856107d056f2a860d98b607ed0a5dc007f68750b4ff7b4633787e9358f769282b9ff8ef73fd6a50eb

  • SSDEEP

    3072:TPA9QdqM+D6f4jVxAoh2PuDq89LRlhuc5zX/fUwf:TPDdqVDRjPv6Aq89LRmc5T3

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      0dd9ffa06dfd4982c75dd5e43fe9f176bcf5bbda5960107c0f4ea3e31af56ce3

    • Size

      124KB

    • MD5

      ffc1187f36fc780ea47cf56b1b452086

    • SHA1

      9ee62b569850a2d5df392333048d6aef42087895

    • SHA256

      0dd9ffa06dfd4982c75dd5e43fe9f176bcf5bbda5960107c0f4ea3e31af56ce3

    • SHA512

      db5d26d8230d5b519317c260ac8c749b2376274cf1d12be856107d056f2a860d98b607ed0a5dc007f68750b4ff7b4633787e9358f769282b9ff8ef73fd6a50eb

    • SSDEEP

      3072:TPA9QdqM+D6f4jVxAoh2PuDq89LRlhuc5zX/fUwf:TPDdqVDRjPv6Aq89LRmc5T3

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks