General

  • Target

    220b93a263bc1bf1a40f8ceece579c382e02d2dc91cad0c57767a1942ecfdc50

  • Size

    124KB

  • Sample

    240715-php32ashnb

  • MD5

    6dd09afe9b6ea00f8f45b2a3e962741c

  • SHA1

    9b78f327d287bb781b28c2870c02e6601ea663c8

  • SHA256

    220b93a263bc1bf1a40f8ceece579c382e02d2dc91cad0c57767a1942ecfdc50

  • SHA512

    e9d4131c08e741eacac281c8256c3d89ca8988f9a726c21c032d5e03b13ffa3f0c2ff42140edfcd409938f572b5e9dc3b44774ef083d7d0397ff6ad3accd208b

  • SSDEEP

    3072:zTLai4BLC75XxGtdijc/a5eH28Ix1wiUFWbc:zyxGc/a5eW8IHw1FE

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      220b93a263bc1bf1a40f8ceece579c382e02d2dc91cad0c57767a1942ecfdc50

    • Size

      124KB

    • MD5

      6dd09afe9b6ea00f8f45b2a3e962741c

    • SHA1

      9b78f327d287bb781b28c2870c02e6601ea663c8

    • SHA256

      220b93a263bc1bf1a40f8ceece579c382e02d2dc91cad0c57767a1942ecfdc50

    • SHA512

      e9d4131c08e741eacac281c8256c3d89ca8988f9a726c21c032d5e03b13ffa3f0c2ff42140edfcd409938f572b5e9dc3b44774ef083d7d0397ff6ad3accd208b

    • SSDEEP

      3072:zTLai4BLC75XxGtdijc/a5eH28Ix1wiUFWbc:zyxGc/a5eW8IHw1FE

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks