General

  • Target

    5dea6ac9f69cd34dc2bca7471973c3b6c435181ba1719c8b8a92902f7d9cbada

  • Size

    123KB

  • Sample

    240715-prbxrs1epr

  • MD5

    89dc47729c93dc5662376914ca360af8

  • SHA1

    3e55bae7efb911d630d772357f12aaf42686fc72

  • SHA256

    5dea6ac9f69cd34dc2bca7471973c3b6c435181ba1719c8b8a92902f7d9cbada

  • SHA512

    ff6c63f7dc6126d9df15b2ab1c50f27bfa2e65aac9fa413d03b0e9fd71553e669ca4fdd93ba1449a695836b9a3bd13fdfe653d12cddeaf0c1d4212c36dc222f5

  • SSDEEP

    3072:U0NWupMPqMW/T2G9OeTBoF48mPZV4unlpIbpXWMJ:U0NX/6WxoFrOlA

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      5dea6ac9f69cd34dc2bca7471973c3b6c435181ba1719c8b8a92902f7d9cbada

    • Size

      123KB

    • MD5

      89dc47729c93dc5662376914ca360af8

    • SHA1

      3e55bae7efb911d630d772357f12aaf42686fc72

    • SHA256

      5dea6ac9f69cd34dc2bca7471973c3b6c435181ba1719c8b8a92902f7d9cbada

    • SHA512

      ff6c63f7dc6126d9df15b2ab1c50f27bfa2e65aac9fa413d03b0e9fd71553e669ca4fdd93ba1449a695836b9a3bd13fdfe653d12cddeaf0c1d4212c36dc222f5

    • SSDEEP

      3072:U0NWupMPqMW/T2G9OeTBoF48mPZV4unlpIbpXWMJ:U0NX/6WxoFrOlA

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks