General

  • Target

    98ff5c272a66ccb3d65cfbab7e26673b7778d655a31d7c86f0d726a7b49551a7

  • Size

    124KB

  • Sample

    240715-n6h4yswarp

  • MD5

    e16870f3991e46faa5c221b2bf7479a1

  • SHA1

    e923b9edea522634dfa91698890bcbae806e75b6

  • SHA256

    98ff5c272a66ccb3d65cfbab7e26673b7778d655a31d7c86f0d726a7b49551a7

  • SHA512

    21cb9a2d7199a225de8e957792385c3eb569aa8eca49976deed983981207a92dc4e3913b4dcb8ea0b9e0f3c6c3d1d343e517a273159d0dd6bbbd748aeb0def14

  • SSDEEP

    3072:PrR9sxIRCct9tGjwmV3gdOqoA3+/flLogyhap2WVHx1j/0:PrfmIloHQdiAunchaYWVHx1j/

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      98ff5c272a66ccb3d65cfbab7e26673b7778d655a31d7c86f0d726a7b49551a7

    • Size

      124KB

    • MD5

      e16870f3991e46faa5c221b2bf7479a1

    • SHA1

      e923b9edea522634dfa91698890bcbae806e75b6

    • SHA256

      98ff5c272a66ccb3d65cfbab7e26673b7778d655a31d7c86f0d726a7b49551a7

    • SHA512

      21cb9a2d7199a225de8e957792385c3eb569aa8eca49976deed983981207a92dc4e3913b4dcb8ea0b9e0f3c6c3d1d343e517a273159d0dd6bbbd748aeb0def14

    • SSDEEP

      3072:PrR9sxIRCct9tGjwmV3gdOqoA3+/flLogyhap2WVHx1j/0:PrfmIloHQdiAunchaYWVHx1j/

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks