General

  • Target

    d7199f11beaae4f35a100845e05f662c672937189f652964d20f0cfa14814598

  • Size

    122KB

  • Sample

    240715-n8qa2szdkd

  • MD5

    2aafeac27c7ab09bb6d384e2c9f0efea

  • SHA1

    cb398463769518709d81e219a50a527164c3d1af

  • SHA256

    d7199f11beaae4f35a100845e05f662c672937189f652964d20f0cfa14814598

  • SHA512

    3c2cda63a72fbe5b7b581332add75e08d27f763ec7efabc5aeb878bad2fce80cac8ac8862c056033635c2a24bab94d5a5e9f90cea4f8d1a80f21ecd139ba09af

  • SSDEEP

    3072:LpiNnQnmf+WcI+uHwk06ZiBcjuUxpKrD:LERQnm2pXuHkoRj3xp

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      d7199f11beaae4f35a100845e05f662c672937189f652964d20f0cfa14814598

    • Size

      122KB

    • MD5

      2aafeac27c7ab09bb6d384e2c9f0efea

    • SHA1

      cb398463769518709d81e219a50a527164c3d1af

    • SHA256

      d7199f11beaae4f35a100845e05f662c672937189f652964d20f0cfa14814598

    • SHA512

      3c2cda63a72fbe5b7b581332add75e08d27f763ec7efabc5aeb878bad2fce80cac8ac8862c056033635c2a24bab94d5a5e9f90cea4f8d1a80f21ecd139ba09af

    • SSDEEP

      3072:LpiNnQnmf+WcI+uHwk06ZiBcjuUxpKrD:LERQnm2pXuHkoRj3xp

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks