General

  • Target

    70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b

  • Size

    125KB

  • Sample

    240715-payefaxhqn

  • MD5

    6bfde1fe74232254a3bc060b5d67177a

  • SHA1

    8eb0a0e5cd3eecf1885e8be7a2689c3fd67754b3

  • SHA256

    70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b

  • SHA512

    c131421e99c60f2653960c2bd58474fa92b29400e5845f2d303c62eeb234cc70953992422cf0828b7895b124519406543d9c7b966021e36ecb89e3a4fa72f260

  • SSDEEP

    3072:BbQy+W5MeOgs8J0qD59Z09117ju923PaFoOMkC/IZXh+T36bQLt535ZitP:Bcy+W+gffmXuo3PoMkC/IFh+TOQLz3Ot

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b

    • Size

      125KB

    • MD5

      6bfde1fe74232254a3bc060b5d67177a

    • SHA1

      8eb0a0e5cd3eecf1885e8be7a2689c3fd67754b3

    • SHA256

      70ac9d2ee4065857d93d2c10a87de8610fc5caa7aa636f77dcd3fed64dfd401b

    • SHA512

      c131421e99c60f2653960c2bd58474fa92b29400e5845f2d303c62eeb234cc70953992422cf0828b7895b124519406543d9c7b966021e36ecb89e3a4fa72f260

    • SSDEEP

      3072:BbQy+W5MeOgs8J0qD59Z09117ju923PaFoOMkC/IZXh+T36bQLt535ZitP:Bcy+W+gffmXuo3PoMkC/IFh+TOQLz3Ot

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks