General

  • Target

    d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3

  • Size

    125KB

  • Sample

    240715-n7n2layhna

  • MD5

    9ceeaf8ad7b6ce0fc0edca9576976ba6

  • SHA1

    8dc2b54613fd4759f313ed7b1fdd508277372bf4

  • SHA256

    d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3

  • SHA512

    7004e35099942e2c0a59d6752d5d948872394914537095c729dfd7139e8cf49bfaac71faf6e5f24319b00789bc74c4dfc14c676557d11c801870d5c3972d41d7

  • SSDEEP

    3072:e9Z2muLFb+aq10n2YBnJm7Lm9uYYXuQQqMvKe:e9sT5Kx16JkepYyqMv

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3

    • Size

      125KB

    • MD5

      9ceeaf8ad7b6ce0fc0edca9576976ba6

    • SHA1

      8dc2b54613fd4759f313ed7b1fdd508277372bf4

    • SHA256

      d8b4102ce8e01efb71b4615e207fcb9ea9fc5c6dbcb17c81f95c716adc1d3cb3

    • SHA512

      7004e35099942e2c0a59d6752d5d948872394914537095c729dfd7139e8cf49bfaac71faf6e5f24319b00789bc74c4dfc14c676557d11c801870d5c3972d41d7

    • SSDEEP

      3072:e9Z2muLFb+aq10n2YBnJm7Lm9uYYXuQQqMvKe:e9sT5Kx16JkepYyqMv

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks