General

  • Target

    0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b

  • Size

    124KB

  • Sample

    240715-n6kyjsydjg

  • MD5

    17c8f655104bd89f543f20c23cbc9526

  • SHA1

    4a624212cf0ec3283fd7f17adcae42278b30a8a7

  • SHA256

    0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b

  • SHA512

    d0a56fb674d2df427f386ead142990c76868eff39d945e0d4c297aba3f006f8836264863153dd160d5e353ae5cacd595b1627f98dd44cdd23234c1ee21520037

  • SSDEEP

    3072:qRf8aREy0dFOXrITS9od4+QpkZkps9fBux/ARVO:M0DsrWVEpkyps9JO/ARV

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b

    • Size

      124KB

    • MD5

      17c8f655104bd89f543f20c23cbc9526

    • SHA1

      4a624212cf0ec3283fd7f17adcae42278b30a8a7

    • SHA256

      0f772beec7c2489172a3094177e42f6291bc13d012d68b51b0e278105fbdda7b

    • SHA512

      d0a56fb674d2df427f386ead142990c76868eff39d945e0d4c297aba3f006f8836264863153dd160d5e353ae5cacd595b1627f98dd44cdd23234c1ee21520037

    • SSDEEP

      3072:qRf8aREy0dFOXrITS9od4+QpkZkps9fBux/ARVO:M0DsrWVEpkyps9JO/ARV

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks