General

  • Target

    147177955f0d4dc4eaf6c1274f3d3ce20170d4d97ff05517e67f936f5e7f1708

  • Size

    124KB

  • Sample

    240715-ntlz3sxdqa

  • MD5

    c39035b47d03d6ff17e5658b5830cf1d

  • SHA1

    9f4c31661dc32ce5dd0f4d5bca8ec178d710dfaa

  • SHA256

    147177955f0d4dc4eaf6c1274f3d3ce20170d4d97ff05517e67f936f5e7f1708

  • SHA512

    18d6970fb400156fbbe80672133fb8f42af55b4d52b6be97e642e58f3add219166a4e97686280241e7cea6e976d9926a172526ef64bfeb3dd662ceba995943a3

  • SSDEEP

    3072:ls2gck0vlQbSZxKTr2TmnlVl4Qh5+mEi0SEWv:ldhWeKnvPjERfS

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      147177955f0d4dc4eaf6c1274f3d3ce20170d4d97ff05517e67f936f5e7f1708

    • Size

      124KB

    • MD5

      c39035b47d03d6ff17e5658b5830cf1d

    • SHA1

      9f4c31661dc32ce5dd0f4d5bca8ec178d710dfaa

    • SHA256

      147177955f0d4dc4eaf6c1274f3d3ce20170d4d97ff05517e67f936f5e7f1708

    • SHA512

      18d6970fb400156fbbe80672133fb8f42af55b4d52b6be97e642e58f3add219166a4e97686280241e7cea6e976d9926a172526ef64bfeb3dd662ceba995943a3

    • SSDEEP

      3072:ls2gck0vlQbSZxKTr2TmnlVl4Qh5+mEi0SEWv:ldhWeKnvPjERfS

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.