General

  • Target

    993a2af7785a94673ebb430ecf026f097b2eef1895cf8a3610ce8127d11affc6

  • Size

    123KB

  • Sample

    240715-n6sndsydrd

  • MD5

    e87b915a9e074dc5979c4b5025af3614

  • SHA1

    665b1098648fcda3ebea5ae8458b21523f40af18

  • SHA256

    993a2af7785a94673ebb430ecf026f097b2eef1895cf8a3610ce8127d11affc6

  • SHA512

    9770e5c258d07ca0940b4f13c93f41f8fd2e6b024451d8984d4c04e9a851696294a371d4cf50a4344d26edd203512e2c695fd6e1ed3d8b50205d4d0b3c1009f2

  • SSDEEP

    3072:jXOFyb2qAEQOGIJoeLOFIPuWpy3u4e1DUNhJk:jXOFyb2iIer1DU/i

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      993a2af7785a94673ebb430ecf026f097b2eef1895cf8a3610ce8127d11affc6

    • Size

      123KB

    • MD5

      e87b915a9e074dc5979c4b5025af3614

    • SHA1

      665b1098648fcda3ebea5ae8458b21523f40af18

    • SHA256

      993a2af7785a94673ebb430ecf026f097b2eef1895cf8a3610ce8127d11affc6

    • SHA512

      9770e5c258d07ca0940b4f13c93f41f8fd2e6b024451d8984d4c04e9a851696294a371d4cf50a4344d26edd203512e2c695fd6e1ed3d8b50205d4d0b3c1009f2

    • SSDEEP

      3072:jXOFyb2qAEQOGIJoeLOFIPuWpy3u4e1DUNhJk:jXOFyb2iIer1DU/i

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks