General

  • Target

    ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7

  • Size

    126KB

  • Sample

    240715-ntlz3svcjp

  • MD5

    8a57cc13c96bde6d963947a9b00333c8

  • SHA1

    c1dbe0a05855235412858b6bbfbb97d9ed488624

  • SHA256

    ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7

  • SHA512

    d748467b69171ea8799ae6f7a0431119073abc230cf59d5659adb8952af0fe818872ad34c66b15441e256a4df695620f13065c8428bfe5e43743761d435cb3c2

  • SSDEEP

    3072:sdQmw+US80dmQIn5xBYB0v2MP133FfVxNWZU:saW+wmQaDPvZW

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7

    • Size

      126KB

    • MD5

      8a57cc13c96bde6d963947a9b00333c8

    • SHA1

      c1dbe0a05855235412858b6bbfbb97d9ed488624

    • SHA256

      ca9cefdd42bf0a8c769c25b229cab227cb52443fd4876a66f9c1cdc9f212e5f7

    • SHA512

      d748467b69171ea8799ae6f7a0431119073abc230cf59d5659adb8952af0fe818872ad34c66b15441e256a4df695620f13065c8428bfe5e43743761d435cb3c2

    • SSDEEP

      3072:sdQmw+US80dmQIn5xBYB0v2MP133FfVxNWZU:saW+wmQaDPvZW

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks