General

  • Target

    0c4bf3b391e8f6fc00297bcbd85cd596e141df0733dbe3c1a35c378e82e2776e

  • Size

    124KB

  • Sample

    240715-n6hs7awarl

  • MD5

    ffc51678c44bf8a0f8fb258ca9a2fd44

  • SHA1

    47c4062063901cccf434a8fd7ae0f991f06b6abe

  • SHA256

    0c4bf3b391e8f6fc00297bcbd85cd596e141df0733dbe3c1a35c378e82e2776e

  • SHA512

    4fcb5afe3f3ade7b2fccf5f40a8b222f07fe7e755c6df83b0e6ed7ab4a5277a96474102e96d3c82699fc8426af9bd483c605444639ad7fd226091c932a14f8b9

  • SSDEEP

    3072:4zA7qqiuXbJjL6eW8kyAa1QoeWUpz95GLSL86:4zAjiudZW8Fe7pxQSL8

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      0c4bf3b391e8f6fc00297bcbd85cd596e141df0733dbe3c1a35c378e82e2776e

    • Size

      124KB

    • MD5

      ffc51678c44bf8a0f8fb258ca9a2fd44

    • SHA1

      47c4062063901cccf434a8fd7ae0f991f06b6abe

    • SHA256

      0c4bf3b391e8f6fc00297bcbd85cd596e141df0733dbe3c1a35c378e82e2776e

    • SHA512

      4fcb5afe3f3ade7b2fccf5f40a8b222f07fe7e755c6df83b0e6ed7ab4a5277a96474102e96d3c82699fc8426af9bd483c605444639ad7fd226091c932a14f8b9

    • SSDEEP

      3072:4zA7qqiuXbJjL6eW8kyAa1QoeWUpz95GLSL86:4zAjiudZW8Fe7pxQSL8

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks