General

  • Target

    3dc7d8f0f1682a1599e9992a52d390a40e68788e0a0c80b05b06c212f9a8c9b3

  • Size

    125KB

  • Sample

    240715-n8rtwaxbkk

  • MD5

    6701cfc2a76ca674c98166fd90e47905

  • SHA1

    49a4c047fa9c8a7ab45912b65e515f74db3df625

  • SHA256

    3dc7d8f0f1682a1599e9992a52d390a40e68788e0a0c80b05b06c212f9a8c9b3

  • SHA512

    e4f82fb5177cc022afd33e2d2a3e9365e5f11c7b9854a8acb8c163f7959e0b85702051e2bb98947f3674f9a3c70ea54192cbd375f80029a22186e4eafef20205

  • SSDEEP

    3072:CvcIzE7M5xmBh1C7ln0g3Bsxw9U6DRwFnDhojIH8I/MfmBb/:w8Mxm70xHmYvDRwFnF8IH8PfmBb/

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      3dc7d8f0f1682a1599e9992a52d390a40e68788e0a0c80b05b06c212f9a8c9b3

    • Size

      125KB

    • MD5

      6701cfc2a76ca674c98166fd90e47905

    • SHA1

      49a4c047fa9c8a7ab45912b65e515f74db3df625

    • SHA256

      3dc7d8f0f1682a1599e9992a52d390a40e68788e0a0c80b05b06c212f9a8c9b3

    • SHA512

      e4f82fb5177cc022afd33e2d2a3e9365e5f11c7b9854a8acb8c163f7959e0b85702051e2bb98947f3674f9a3c70ea54192cbd375f80029a22186e4eafef20205

    • SSDEEP

      3072:CvcIzE7M5xmBh1C7ln0g3Bsxw9U6DRwFnDhojIH8I/MfmBb/:w8Mxm70xHmYvDRwFnF8IH8PfmBb/

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks