General

  • Target

    d4693e87aee3b9fbc28f6c5f207d487e08814b16b69a7d6dfbcdbce77922cb6c

  • Size

    125KB

  • Sample

    240715-n7bq9swejj

  • MD5

    227b14f90f872d74a1f6626f10eb4073

  • SHA1

    5e45ea35add4b34915080ededf8d180f941e55ba

  • SHA256

    d4693e87aee3b9fbc28f6c5f207d487e08814b16b69a7d6dfbcdbce77922cb6c

  • SHA512

    6b123f2464975a738ad87d606bc05da9be8fee593079811d5921ce0989c7a42475031edbe0621c1758ac123d1a35ff90d22234741cafdcabc25945aface10a1f

  • SSDEEP

    3072:DpfT3fy7ah/7yMHBi9SL3CN3cx1jU6hLL/A5kcEPDPwCzJh:DFT2aFBMSL3Cu8aL/AudXzj

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      d4693e87aee3b9fbc28f6c5f207d487e08814b16b69a7d6dfbcdbce77922cb6c

    • Size

      125KB

    • MD5

      227b14f90f872d74a1f6626f10eb4073

    • SHA1

      5e45ea35add4b34915080ededf8d180f941e55ba

    • SHA256

      d4693e87aee3b9fbc28f6c5f207d487e08814b16b69a7d6dfbcdbce77922cb6c

    • SHA512

      6b123f2464975a738ad87d606bc05da9be8fee593079811d5921ce0989c7a42475031edbe0621c1758ac123d1a35ff90d22234741cafdcabc25945aface10a1f

    • SSDEEP

      3072:DpfT3fy7ah/7yMHBi9SL3CN3cx1jU6hLL/A5kcEPDPwCzJh:DFT2aFBMSL3Cu8aL/AudXzj

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks