General

  • Target

    8a4c1ddd05b12a4ff2f7f06fbbd71361bed3cc2165e7ee8e573cb41fc6d219d5

  • Size

    124KB

  • Sample

    240715-n6kmsaydja

  • MD5

    c2eddb6e694f155410e2ada7d103dbde

  • SHA1

    03941d5e69b9b57289ffb70a2f4d47ae8c479bb8

  • SHA256

    8a4c1ddd05b12a4ff2f7f06fbbd71361bed3cc2165e7ee8e573cb41fc6d219d5

  • SHA512

    3bcf46a1e173018c70d0d2b1305d3f411d8e0ed54b5046bdcdef205d0fc41aaa38e679a0db036911841a03b6fc19856ddeac758276832c13256bf61bce5fad52

  • SSDEEP

    3072:f9jor6IUb51RqXuiOTr1iHYQldjpaNdpLo9t+R:1q6Tb51R+ROXaYydITLoj+R

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      8a4c1ddd05b12a4ff2f7f06fbbd71361bed3cc2165e7ee8e573cb41fc6d219d5

    • Size

      124KB

    • MD5

      c2eddb6e694f155410e2ada7d103dbde

    • SHA1

      03941d5e69b9b57289ffb70a2f4d47ae8c479bb8

    • SHA256

      8a4c1ddd05b12a4ff2f7f06fbbd71361bed3cc2165e7ee8e573cb41fc6d219d5

    • SHA512

      3bcf46a1e173018c70d0d2b1305d3f411d8e0ed54b5046bdcdef205d0fc41aaa38e679a0db036911841a03b6fc19856ddeac758276832c13256bf61bce5fad52

    • SSDEEP

      3072:f9jor6IUb51RqXuiOTr1iHYQldjpaNdpLo9t+R:1q6Tb51R+ROXaYydITLoj+R

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks