General

  • Target

    ca35b3dc86b403abee258ca3138a5de1113460a709eb07ab0db0ddba4d8483fc

  • Size

    125KB

  • Sample

    240715-pcb9zsydlm

  • MD5

    921a1c88bb72c6d023c9caccce4d5d8c

  • SHA1

    c5a3ce0fe5f55146145e4c80ad9c70a004025559

  • SHA256

    ca35b3dc86b403abee258ca3138a5de1113460a709eb07ab0db0ddba4d8483fc

  • SHA512

    dfa0d0a71cd3f09643c2f967f7cd523857763a4e7e6a629ab114f0650c557932b2e4a2ccd632444d457eb85334848dcb9247da787ff0e2b91e2c89d75e297ce8

  • SSDEEP

    3072:RMVpmyafyzj5L0IPh2P6ArZOUTnxEKS+Ya+Pf3S:RMpFt/xPQpHT6+Y7f

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      ca35b3dc86b403abee258ca3138a5de1113460a709eb07ab0db0ddba4d8483fc

    • Size

      125KB

    • MD5

      921a1c88bb72c6d023c9caccce4d5d8c

    • SHA1

      c5a3ce0fe5f55146145e4c80ad9c70a004025559

    • SHA256

      ca35b3dc86b403abee258ca3138a5de1113460a709eb07ab0db0ddba4d8483fc

    • SHA512

      dfa0d0a71cd3f09643c2f967f7cd523857763a4e7e6a629ab114f0650c557932b2e4a2ccd632444d457eb85334848dcb9247da787ff0e2b91e2c89d75e297ce8

    • SSDEEP

      3072:RMVpmyafyzj5L0IPh2P6ArZOUTnxEKS+Ya+Pf3S:RMpFt/xPQpHT6+Y7f

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks