General

  • Target

    7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40

  • Size

    124KB

  • Sample

    240715-pawwlsxhpl

  • MD5

    a1864815fc365c676580eb540e2de8b3

  • SHA1

    e9422c6e7e28e21bbbea22a1cfaab10040be89eb

  • SHA256

    7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40

  • SHA512

    3bad0b969983376e7c8f2c3f64e1fa1b17a518d1b91f0b133295d3723afc26cc89dd3cda72bb214e7af20b15c5c5a7c3988663c7935bd13d45fcd002308e0370

  • SSDEEP

    3072:pLuHb+MnKj8scDb4vTy0ePBwn8Ml+q7KLfjOkf6:pLsKjSkTMpUGq2jSkf

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40

    • Size

      124KB

    • MD5

      a1864815fc365c676580eb540e2de8b3

    • SHA1

      e9422c6e7e28e21bbbea22a1cfaab10040be89eb

    • SHA256

      7652d5a0cb9eb7877ca197391a134a09ca2d350decea6c88c5a9eb8e82786a40

    • SHA512

      3bad0b969983376e7c8f2c3f64e1fa1b17a518d1b91f0b133295d3723afc26cc89dd3cda72bb214e7af20b15c5c5a7c3988663c7935bd13d45fcd002308e0370

    • SSDEEP

      3072:pLuHb+MnKj8scDb4vTy0ePBwn8Ml+q7KLfjOkf6:pLsKjSkTMpUGq2jSkf

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks