General

  • Target

    c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08

  • Size

    123KB

  • Sample

    240715-pa3dds1bqb

  • MD5

    b6d3e7f0c31079b6146f05472c6d28ce

  • SHA1

    f552d640fd39a2a2a0ba22840e814d9163f05983

  • SHA256

    c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08

  • SHA512

    b68ddf323dc842c0ad0239f62b2ba10ea2c5bc330c77396994100d827560e646de2482bc2acffe0d07fec1336c744b5ccd9f874e37617a02de18e5f1c56daf4c

  • SSDEEP

    3072:IQ4YYUCrf3xsErRUTG74kPHjUNOA/O00u7oJsRC:jCrf3OEdUT4HjUwN/s

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08

    • Size

      123KB

    • MD5

      b6d3e7f0c31079b6146f05472c6d28ce

    • SHA1

      f552d640fd39a2a2a0ba22840e814d9163f05983

    • SHA256

      c9edf95b80c3722ab6370e08030a98b9fab9ec0ab89bf88c12cedf1391e60b08

    • SHA512

      b68ddf323dc842c0ad0239f62b2ba10ea2c5bc330c77396994100d827560e646de2482bc2acffe0d07fec1336c744b5ccd9f874e37617a02de18e5f1c56daf4c

    • SSDEEP

      3072:IQ4YYUCrf3xsErRUTG74kPHjUNOA/O00u7oJsRC:jCrf3OEdUT4HjUwN/s

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks