General

  • Target

    b32e72a7e9d1136fd7b3b994bb2ffaba0b787545367a45fbcf4df2ddd732185e

  • Size

    125KB

  • Sample

    240715-n6g7naycnd

  • MD5

    5ad35c27f92464d0761b8b950585ee4e

  • SHA1

    fbae801f509a5f271c0bf49a6dfd195c8f7ac957

  • SHA256

    b32e72a7e9d1136fd7b3b994bb2ffaba0b787545367a45fbcf4df2ddd732185e

  • SHA512

    706e2c759b4fd3745a03bed753d456883e11ceb5ea4e8bfb19eb4a32a8501fc82e5c0d2723053ee2e35e022071d3f426a3b05172a210f41dd04a904fcd4d97db

  • SSDEEP

    3072:FbJp2gizkC3364pLptLKwbhMcJo9yy+EMjx2N0:FbJp2glU751McJo9yyWjF

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      b32e72a7e9d1136fd7b3b994bb2ffaba0b787545367a45fbcf4df2ddd732185e

    • Size

      125KB

    • MD5

      5ad35c27f92464d0761b8b950585ee4e

    • SHA1

      fbae801f509a5f271c0bf49a6dfd195c8f7ac957

    • SHA256

      b32e72a7e9d1136fd7b3b994bb2ffaba0b787545367a45fbcf4df2ddd732185e

    • SHA512

      706e2c759b4fd3745a03bed753d456883e11ceb5ea4e8bfb19eb4a32a8501fc82e5c0d2723053ee2e35e022071d3f426a3b05172a210f41dd04a904fcd4d97db

    • SSDEEP

      3072:FbJp2gizkC3364pLptLKwbhMcJo9yy+EMjx2N0:FbJp2glU751McJo9yyWjF

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks