General

  • Target

    19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0

  • Size

    125KB

  • Sample

    240715-n8n3zszdja

  • MD5

    31e9a2b1534a9fe2b68bea627ab9bf4b

  • SHA1

    1e2110897d8c01830fafc5b0d5a1bc381deffe79

  • SHA256

    19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0

  • SHA512

    e469557232149b28a7259c13d80bac5452e8d2e29c6621dc895698c11a0d75e771a91af2910fdbe6cf8751f31f03e7c667b01f4ee6165d6433f4e36974265616

  • SSDEEP

    3072:wH+zvAeClVnQa5EZbRLgGLsE8br2J/Cu+RHzvGaczuqlLFC:LrsVQ51RceYyEnczuaxC

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0

    • Size

      125KB

    • MD5

      31e9a2b1534a9fe2b68bea627ab9bf4b

    • SHA1

      1e2110897d8c01830fafc5b0d5a1bc381deffe79

    • SHA256

      19b8e650ad6c1743f588eeeac25c7c51ced85a4a53c5f4440a4910c3592031f0

    • SHA512

      e469557232149b28a7259c13d80bac5452e8d2e29c6621dc895698c11a0d75e771a91af2910fdbe6cf8751f31f03e7c667b01f4ee6165d6433f4e36974265616

    • SSDEEP

      3072:wH+zvAeClVnQa5EZbRLgGLsE8br2J/Cu+RHzvGaczuqlLFC:LrsVQ51RceYyEnczuaxC

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks