General

  • Target

    cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b

  • Size

    123KB

  • Sample

    240715-n6j19aycra

  • MD5

    66d19a2af19d0635f70b29ca081fdc6e

  • SHA1

    6c35a5b158a3a9bfc1cf8436c8a948efe207ce47

  • SHA256

    cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b

  • SHA512

    1c5bc6d7d78e22ca6a82db46ca5bc4adf04a9cede337dd1bc0197ca82e470f56fa5a91d868745a814ebc4e9bd6c909bf3be61398872f5997a969501acad053f5

  • SSDEEP

    3072:ldDo0RwheAa96tMr63YWuwuz4SdP6yP3i5jYXCi8F:00uEAa96gwuznd3cMSn

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b

    • Size

      123KB

    • MD5

      66d19a2af19d0635f70b29ca081fdc6e

    • SHA1

      6c35a5b158a3a9bfc1cf8436c8a948efe207ce47

    • SHA256

      cced410d36c358f4578146592c45c91427b1d3dccd79de673f1c632f98eccf1b

    • SHA512

      1c5bc6d7d78e22ca6a82db46ca5bc4adf04a9cede337dd1bc0197ca82e470f56fa5a91d868745a814ebc4e9bd6c909bf3be61398872f5997a969501acad053f5

    • SSDEEP

      3072:ldDo0RwheAa96tMr63YWuwuz4SdP6yP3i5jYXCi8F:00uEAa96gwuznd3cMSn

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks