General

  • Target

    ccd8d8e7fb16bb469f6d43ced6ad3b097fe51ea1283f2a662575f20239b85c6c

  • Size

    123KB

  • Sample

    240715-n6jqgsycqc

  • MD5

    7ee536adbf7c4dcba1d25457432e9535

  • SHA1

    499ac76186e16121f1843e8854b496fc98d2071f

  • SHA256

    ccd8d8e7fb16bb469f6d43ced6ad3b097fe51ea1283f2a662575f20239b85c6c

  • SHA512

    66654fbb32ccd9f5cb7687f8480e4810327fc0ee0876af9dcfe3776fb58679f3aab5ff8f5c0839cbf6987186d0bdc32d73f5dc650c6941371a1bc762c7cb8c41

  • SSDEEP

    3072:OjKHICOMyCrVGO3F8CynbyxqNyoRW4qEMy:LLlr0tPbKno4

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      ccd8d8e7fb16bb469f6d43ced6ad3b097fe51ea1283f2a662575f20239b85c6c

    • Size

      123KB

    • MD5

      7ee536adbf7c4dcba1d25457432e9535

    • SHA1

      499ac76186e16121f1843e8854b496fc98d2071f

    • SHA256

      ccd8d8e7fb16bb469f6d43ced6ad3b097fe51ea1283f2a662575f20239b85c6c

    • SHA512

      66654fbb32ccd9f5cb7687f8480e4810327fc0ee0876af9dcfe3776fb58679f3aab5ff8f5c0839cbf6987186d0bdc32d73f5dc650c6941371a1bc762c7cb8c41

    • SSDEEP

      3072:OjKHICOMyCrVGO3F8CynbyxqNyoRW4qEMy:LLlr0tPbKno4

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks