General

  • Target

    dc857f7a313f2c158ec0a16fcdbd4a110dc0038c76f6e4cf5cda3b792d4e0b09

  • Size

    122KB

  • Sample

    240715-n8pphsxaqr

  • MD5

    e1b5f869c1a9e3813f515a2809107a02

  • SHA1

    d775947200c8a15e2e43c31d5066bf6e5fbda265

  • SHA256

    dc857f7a313f2c158ec0a16fcdbd4a110dc0038c76f6e4cf5cda3b792d4e0b09

  • SHA512

    b0c66cf8d6cd565749f018127cb2485240f6d5b1718e33e8091fa0382a17aa40c0395b63f3c0809dc4c3086eac81bb13ee877e153ae555d2eba7b87903c820ce

  • SSDEEP

    3072:Jrfmj7+JXargS3dQaXtAKhJ+vPl+BGzEjc:Jij7GakIKa9L+v9nK

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      dc857f7a313f2c158ec0a16fcdbd4a110dc0038c76f6e4cf5cda3b792d4e0b09

    • Size

      122KB

    • MD5

      e1b5f869c1a9e3813f515a2809107a02

    • SHA1

      d775947200c8a15e2e43c31d5066bf6e5fbda265

    • SHA256

      dc857f7a313f2c158ec0a16fcdbd4a110dc0038c76f6e4cf5cda3b792d4e0b09

    • SHA512

      b0c66cf8d6cd565749f018127cb2485240f6d5b1718e33e8091fa0382a17aa40c0395b63f3c0809dc4c3086eac81bb13ee877e153ae555d2eba7b87903c820ce

    • SSDEEP

      3072:Jrfmj7+JXargS3dQaXtAKhJ+vPl+BGzEjc:Jij7GakIKa9L+v9nK

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks