General

  • Target

    e8f92d9b98e9e32ef9df7731d900089ba281bbc19d31280f1d5fbce6e523aad7

  • Size

    124KB

  • Sample

    240715-pr7z7stgpg

  • MD5

    ee965094f35e8340e0e5c0861e90ea89

  • SHA1

    914a52072fcaf5d62223759cf3946e11514da93e

  • SHA256

    e8f92d9b98e9e32ef9df7731d900089ba281bbc19d31280f1d5fbce6e523aad7

  • SHA512

    ec174e22e6fa7a2e52f6a91a016419b48b9a31bedc17e28eaeebdb37b6368da9cdae34995e787b71414678ab99c30713182969d17446529aea8fa7211150b928

  • SSDEEP

    3072:tALETkTcKvi7d+hX/Zq5cxsWNnMXaGfArBrfv8:tA4IgKq7UZhqSxVnxgAdf0

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      e8f92d9b98e9e32ef9df7731d900089ba281bbc19d31280f1d5fbce6e523aad7

    • Size

      124KB

    • MD5

      ee965094f35e8340e0e5c0861e90ea89

    • SHA1

      914a52072fcaf5d62223759cf3946e11514da93e

    • SHA256

      e8f92d9b98e9e32ef9df7731d900089ba281bbc19d31280f1d5fbce6e523aad7

    • SHA512

      ec174e22e6fa7a2e52f6a91a016419b48b9a31bedc17e28eaeebdb37b6368da9cdae34995e787b71414678ab99c30713182969d17446529aea8fa7211150b928

    • SSDEEP

      3072:tALETkTcKvi7d+hX/Zq5cxsWNnMXaGfArBrfv8:tA4IgKq7UZhqSxVnxgAdf0

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks