General

  • Target

    c79b9a7889fd7abb6e2d6d28601e1f0d693d486169b26ded5e9df0605313b207

  • Size

    124KB

  • Sample

    240715-n8k2bsxamq

  • MD5

    2932ada5030e5034f61a475356af1bab

  • SHA1

    ecc4d9d275ee442188738c053c03c6648f3d042e

  • SHA256

    c79b9a7889fd7abb6e2d6d28601e1f0d693d486169b26ded5e9df0605313b207

  • SHA512

    08e16fd286cac9857ffb4400ca4a64d3a44e10a889fa56d42a91b04dc35208ca14dd67c6a1985a878d35a455da711ba407f4fb2eb2e6144267bb77f6e47b87b6

  • SSDEEP

    3072:pHhCsbtDY0tZuemUgBWzFUDXmV43SKF8Ua:espR0enF4X06L

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      c79b9a7889fd7abb6e2d6d28601e1f0d693d486169b26ded5e9df0605313b207

    • Size

      124KB

    • MD5

      2932ada5030e5034f61a475356af1bab

    • SHA1

      ecc4d9d275ee442188738c053c03c6648f3d042e

    • SHA256

      c79b9a7889fd7abb6e2d6d28601e1f0d693d486169b26ded5e9df0605313b207

    • SHA512

      08e16fd286cac9857ffb4400ca4a64d3a44e10a889fa56d42a91b04dc35208ca14dd67c6a1985a878d35a455da711ba407f4fb2eb2e6144267bb77f6e47b87b6

    • SSDEEP

      3072:pHhCsbtDY0tZuemUgBWzFUDXmV43SKF8Ua:espR0enF4X06L

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks