General

  • Target

    170e7dc3df250f73a43d3f12a7d78df4d70fdbe9610049ade3e7359ba2fa311a

  • Size

    123KB

  • Sample

    240715-n8qxksxarp

  • MD5

    61525bdba6103ef55b7e856c016d971c

  • SHA1

    9a7f38f41e8762dbd29cdfb47b126f661ee723cb

  • SHA256

    170e7dc3df250f73a43d3f12a7d78df4d70fdbe9610049ade3e7359ba2fa311a

  • SHA512

    5d92e595e1570823373639589ce3d85f781528b9b8cd078eb91a895d173f2ebdbe57b7f40742a35ea5791295884264c0b30e72ce2752cb616bc17a7fc526818f

  • SSDEEP

    3072:3rw2uRwm6k1WDqO22MmRLelr0e01syaI1fC+NOkm:37uRaksD5tMbJathY+NO

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      170e7dc3df250f73a43d3f12a7d78df4d70fdbe9610049ade3e7359ba2fa311a

    • Size

      123KB

    • MD5

      61525bdba6103ef55b7e856c016d971c

    • SHA1

      9a7f38f41e8762dbd29cdfb47b126f661ee723cb

    • SHA256

      170e7dc3df250f73a43d3f12a7d78df4d70fdbe9610049ade3e7359ba2fa311a

    • SHA512

      5d92e595e1570823373639589ce3d85f781528b9b8cd078eb91a895d173f2ebdbe57b7f40742a35ea5791295884264c0b30e72ce2752cb616bc17a7fc526818f

    • SSDEEP

      3072:3rw2uRwm6k1WDqO22MmRLelr0e01syaI1fC+NOkm:37uRaksD5tMbJathY+NO

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks