General

  • Target

    4d6eae26bf60f7868f640b648ac7bf99ba17acc0123166a2a37edc4f032f99c9

  • Size

    122KB

  • Sample

    240715-pr56ls1fml

  • MD5

    2e5d04cf5a5bd731942ad8ba83be70fa

  • SHA1

    4621579de50e7f9648b6dff67688c59406ebf3c1

  • SHA256

    4d6eae26bf60f7868f640b648ac7bf99ba17acc0123166a2a37edc4f032f99c9

  • SHA512

    e5c31413bae843be71b97dd2b8c6de8318072f0585ff067ac4e9e2dfc7dc8782c45a498d50770f8f1f887e64fcb7ca8de27ccd00f12820cba61944af3feb687f

  • SSDEEP

    3072:9quioUThv1BF27CkP8I1LWvOROT3NmEGmXJQ2h+:9qiUThVxOaGRWMT8JQ

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      4d6eae26bf60f7868f640b648ac7bf99ba17acc0123166a2a37edc4f032f99c9

    • Size

      122KB

    • MD5

      2e5d04cf5a5bd731942ad8ba83be70fa

    • SHA1

      4621579de50e7f9648b6dff67688c59406ebf3c1

    • SHA256

      4d6eae26bf60f7868f640b648ac7bf99ba17acc0123166a2a37edc4f032f99c9

    • SHA512

      e5c31413bae843be71b97dd2b8c6de8318072f0585ff067ac4e9e2dfc7dc8782c45a498d50770f8f1f887e64fcb7ca8de27ccd00f12820cba61944af3feb687f

    • SSDEEP

      3072:9quioUThv1BF27CkP8I1LWvOROT3NmEGmXJQ2h+:9qiUThVxOaGRWMT8JQ

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks