General

  • Target

    6eafec7b3dd3692c922b6dbf7c288ac03b0481d2cd1ad5f49fa967f4a3c34472

  • Size

    123KB

  • Sample

    240715-n7116azaqe

  • MD5

    ef12f8b4a73034ade62eb5adc01d5a3f

  • SHA1

    1f147c24d2052a92fe9eeed167c146e9ec7e35fd

  • SHA256

    6eafec7b3dd3692c922b6dbf7c288ac03b0481d2cd1ad5f49fa967f4a3c34472

  • SHA512

    aa146370a84c81f7c3e41343d8ad2210c96689a565a3e82bbeead2edcb39c912da43f599cd80eada2adf6f1815d701872c8b292a0f9adfec81f5f7d5473b7847

  • SSDEEP

    3072:5/XGyS1Pet/qnEfg4vYi04FVVPPprQl+:JXGySRkqnEfgiYqDHpj

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      6eafec7b3dd3692c922b6dbf7c288ac03b0481d2cd1ad5f49fa967f4a3c34472

    • Size

      123KB

    • MD5

      ef12f8b4a73034ade62eb5adc01d5a3f

    • SHA1

      1f147c24d2052a92fe9eeed167c146e9ec7e35fd

    • SHA256

      6eafec7b3dd3692c922b6dbf7c288ac03b0481d2cd1ad5f49fa967f4a3c34472

    • SHA512

      aa146370a84c81f7c3e41343d8ad2210c96689a565a3e82bbeead2edcb39c912da43f599cd80eada2adf6f1815d701872c8b292a0f9adfec81f5f7d5473b7847

    • SSDEEP

      3072:5/XGyS1Pet/qnEfg4vYi04FVVPPprQl+:JXGySRkqnEfgiYqDHpj

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks