General

  • Target

    98a48b99132d4f830fc841cf2a8a7b9da6b47f2d0270db0525ae771af426522f

  • Size

    128KB

  • Sample

    240715-pfyx6asena

  • MD5

    4f116d3d73c79309a57e4c8a75ef8923

  • SHA1

    e766a7fb647577f096cbcc4378231cc3f6079a7c

  • SHA256

    98a48b99132d4f830fc841cf2a8a7b9da6b47f2d0270db0525ae771af426522f

  • SHA512

    8c237cc873ab4215e6390f7700fc65d3db77b9079e5458c663dbad8468ff2d4f7e6bdfcc417cc2d14198fdd1fe647eced2a2210cafdb93e7312abe68b47a5cd7

  • SSDEEP

    3072:AoPYu+Gl2wezbVYW17VmwjFxx5g6Qnd3gbiX1siI9:ADtwWVYo06xvIauXO

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      98a48b99132d4f830fc841cf2a8a7b9da6b47f2d0270db0525ae771af426522f

    • Size

      128KB

    • MD5

      4f116d3d73c79309a57e4c8a75ef8923

    • SHA1

      e766a7fb647577f096cbcc4378231cc3f6079a7c

    • SHA256

      98a48b99132d4f830fc841cf2a8a7b9da6b47f2d0270db0525ae771af426522f

    • SHA512

      8c237cc873ab4215e6390f7700fc65d3db77b9079e5458c663dbad8468ff2d4f7e6bdfcc417cc2d14198fdd1fe647eced2a2210cafdb93e7312abe68b47a5cd7

    • SSDEEP

      3072:AoPYu+Gl2wezbVYW17VmwjFxx5g6Qnd3gbiX1siI9:ADtwWVYo06xvIauXO

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks