General

  • Target

    b49bb2f612ceac37ffe26cef92974d9db2b04480a50f307d7dc7b744381e7199

  • Size

    125KB

  • Sample

    240715-n6h4ysycpg

  • MD5

    082fcc987142beda67899af3fa33f62f

  • SHA1

    0e97d41899e30adb759279977bd141e5836a4687

  • SHA256

    b49bb2f612ceac37ffe26cef92974d9db2b04480a50f307d7dc7b744381e7199

  • SHA512

    768a143b39497265de79556adc0a836bd045bee1a70201c4eb651941083cbf5502b5dcfe19aa19ac6151b2483fb32d89c76af9c8a862f254e1bcc8e2494b5c56

  • SSDEEP

    3072:bvlfz6mAI7iURYzFj2gUkwVlCfh51pSZn1FYoyT0R4alWSrp:bNWmxYz9MkWlYf1pK1F9i0+aYSrp

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      b49bb2f612ceac37ffe26cef92974d9db2b04480a50f307d7dc7b744381e7199

    • Size

      125KB

    • MD5

      082fcc987142beda67899af3fa33f62f

    • SHA1

      0e97d41899e30adb759279977bd141e5836a4687

    • SHA256

      b49bb2f612ceac37ffe26cef92974d9db2b04480a50f307d7dc7b744381e7199

    • SHA512

      768a143b39497265de79556adc0a836bd045bee1a70201c4eb651941083cbf5502b5dcfe19aa19ac6151b2483fb32d89c76af9c8a862f254e1bcc8e2494b5c56

    • SSDEEP

      3072:bvlfz6mAI7iURYzFj2gUkwVlCfh51pSZn1FYoyT0R4alWSrp:bNWmxYz9MkWlYf1pK1F9i0+aYSrp

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks