General

  • Target

    2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245

  • Size

    121KB

  • Sample

    240715-pa1vkayajj

  • MD5

    41e490c8826f271248dafd303b60caa9

  • SHA1

    ed01afbd0140171d8e028cff920f2b6d117f4b1d

  • SHA256

    2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245

  • SHA512

    01ecc2c3ad8f59da13d3b76be5b5ab238e56259e57accf507af5ee3c9fea2062e0cd6c401a1f559f05bddf1c32504906f1263970d08a7a2c702ad2973b941b98

  • SSDEEP

    1536:umu+AA+GYs0R/LuN23Wglz7bnaWPw5i04+g4bb2vRrX/wOAPGojRR5ocYXmZoiMb:umnOrte2Rz7baWL+3kr69ohjGM

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245

    • Size

      121KB

    • MD5

      41e490c8826f271248dafd303b60caa9

    • SHA1

      ed01afbd0140171d8e028cff920f2b6d117f4b1d

    • SHA256

      2c14d7cd07edbde6b7baafe3fa93197a2ee123566b56e3c26c2f60689605a245

    • SHA512

      01ecc2c3ad8f59da13d3b76be5b5ab238e56259e57accf507af5ee3c9fea2062e0cd6c401a1f559f05bddf1c32504906f1263970d08a7a2c702ad2973b941b98

    • SSDEEP

      1536:umu+AA+GYs0R/LuN23Wglz7bnaWPw5i04+g4bb2vRrX/wOAPGojRR5ocYXmZoiMb:umnOrte2Rz7baWL+3kr69ohjGM

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks