General

  • Target

    c51753eea5cb07b04212c4daa857a39dd28bb60c62125c160ab3aa6e4d77e0cd

  • Size

    123KB

  • Sample

    240715-n6kb1sycrf

  • MD5

    387e16b21b474dd35693e18ca9e88aaf

  • SHA1

    32cd6b84a958f76427b8f2fd1418ecbdfcbb4ede

  • SHA256

    c51753eea5cb07b04212c4daa857a39dd28bb60c62125c160ab3aa6e4d77e0cd

  • SHA512

    cfbdcc67580c0991879dc849876d8c139837e67504e0ff206239b52b83d86b12280b4f54cb54ddaec2df4ac528dfb07f53677310f830a8bca4237c8ab9edbc20

  • SSDEEP

    3072:UbKnJupWn8c7QsE5otvc/etSJip0q0Id4OaGpf:qKIES0eWtSJMKcp

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      c51753eea5cb07b04212c4daa857a39dd28bb60c62125c160ab3aa6e4d77e0cd

    • Size

      123KB

    • MD5

      387e16b21b474dd35693e18ca9e88aaf

    • SHA1

      32cd6b84a958f76427b8f2fd1418ecbdfcbb4ede

    • SHA256

      c51753eea5cb07b04212c4daa857a39dd28bb60c62125c160ab3aa6e4d77e0cd

    • SHA512

      cfbdcc67580c0991879dc849876d8c139837e67504e0ff206239b52b83d86b12280b4f54cb54ddaec2df4ac528dfb07f53677310f830a8bca4237c8ab9edbc20

    • SSDEEP

      3072:UbKnJupWn8c7QsE5otvc/etSJip0q0Id4OaGpf:qKIES0eWtSJMKcp

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks