General

  • Target

    aee17df1799e7d86e5ce25c48e9b108d8cb8e47d169f6bfc6cf222c98d16eeac

  • Size

    124KB

  • Sample

    240715-pderhaygjj

  • MD5

    0756626fd538b7dcb1689c240a34029a

  • SHA1

    9b3de325eaa65f4596200052f1e236b9ee53988d

  • SHA256

    aee17df1799e7d86e5ce25c48e9b108d8cb8e47d169f6bfc6cf222c98d16eeac

  • SHA512

    c32ae973bb5dad5d41c80b112c57295a4434996b9d99f0128f2a08431638718920c299043d4d9c144fef541b39315af3b5b074ebbb11920eab9bfc7dd5462f2d

  • SSDEEP

    3072:JXRpk69HFBf4S2p3e4r3UA+nlEGmGwN+H:FjHrtZk3e4rMnlEPY

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      aee17df1799e7d86e5ce25c48e9b108d8cb8e47d169f6bfc6cf222c98d16eeac

    • Size

      124KB

    • MD5

      0756626fd538b7dcb1689c240a34029a

    • SHA1

      9b3de325eaa65f4596200052f1e236b9ee53988d

    • SHA256

      aee17df1799e7d86e5ce25c48e9b108d8cb8e47d169f6bfc6cf222c98d16eeac

    • SHA512

      c32ae973bb5dad5d41c80b112c57295a4434996b9d99f0128f2a08431638718920c299043d4d9c144fef541b39315af3b5b074ebbb11920eab9bfc7dd5462f2d

    • SSDEEP

      3072:JXRpk69HFBf4S2p3e4r3UA+nlEGmGwN+H:FjHrtZk3e4rMnlEPY

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks