General

  • Target

    f3a8da87b188dfbec36e0d1854cd594a76c068fdc97160e1526eecae2870697f

  • Size

    121KB

  • Sample

    240715-n6v4hsyema

  • MD5

    3a0464adceb0e0ffbab3ae13c301a319

  • SHA1

    1ac9e811e8e68315c9123588d483fc8c30e2ce57

  • SHA256

    f3a8da87b188dfbec36e0d1854cd594a76c068fdc97160e1526eecae2870697f

  • SHA512

    e5ea9509f8d431b3d5d20d9ede4e5fdde6b7458291a0ad50b10b3b3b16e3d8e410f183a2ba74c3c73bcf9c2ba47f72f86a719769b4f4899855178172b9289a6d

  • SSDEEP

    3072:ABMtHc9HaiKt09koNaolXD7D4IEeTenoWPSzOs4UH:Ubs6q857D4ZeTesz5

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      f3a8da87b188dfbec36e0d1854cd594a76c068fdc97160e1526eecae2870697f

    • Size

      121KB

    • MD5

      3a0464adceb0e0ffbab3ae13c301a319

    • SHA1

      1ac9e811e8e68315c9123588d483fc8c30e2ce57

    • SHA256

      f3a8da87b188dfbec36e0d1854cd594a76c068fdc97160e1526eecae2870697f

    • SHA512

      e5ea9509f8d431b3d5d20d9ede4e5fdde6b7458291a0ad50b10b3b3b16e3d8e410f183a2ba74c3c73bcf9c2ba47f72f86a719769b4f4899855178172b9289a6d

    • SSDEEP

      3072:ABMtHc9HaiKt09koNaolXD7D4IEeTenoWPSzOs4UH:Ubs6q857D4ZeTesz5

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks