General

  • Target

    5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c

  • Size

    123KB

  • Sample

    240715-pr8xha1fnl

  • MD5

    d864ca9c9c010fb3ca8d878f21743c1f

  • SHA1

    e8929100e3334611e1a25b46f6356ade6d9901ab

  • SHA256

    5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c

  • SHA512

    30f31a3e9be82772a545606fa2c7e2c3f2e05c12ca54a65efb15ee645e5471357770917a08bb5be2c8bc366c5b8d394c27e8d5517cb7c010ee82cfa8fd7acbb7

  • SSDEEP

    3072:GAzLRtTBhKXgQ0x5HYQtcJWHF+HHB0dq7u:jztxBhKXT/QKeeh0su

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c

    • Size

      123KB

    • MD5

      d864ca9c9c010fb3ca8d878f21743c1f

    • SHA1

      e8929100e3334611e1a25b46f6356ade6d9901ab

    • SHA256

      5d6d3557c280624ed4916d8b4c3eb8c2261e188daa127ea5c09161cd75b6210c

    • SHA512

      30f31a3e9be82772a545606fa2c7e2c3f2e05c12ca54a65efb15ee645e5471357770917a08bb5be2c8bc366c5b8d394c27e8d5517cb7c010ee82cfa8fd7acbb7

    • SSDEEP

      3072:GAzLRtTBhKXgQ0x5HYQtcJWHF+HHB0dq7u:jztxBhKXT/QKeeh0su

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks