General

  • Target

    9cbe21e2c1e100dd5922bc7d4bc41c229ec2b89817ebbeecf739341bf8a22dcc

  • Size

    123KB

  • Sample

    240715-prkvnstgkb

  • MD5

    de38b8b5d76b00d21b67fbc39c32148b

  • SHA1

    eb61fbf95cc30bd2d7bf9848c5bd9052bdb8b815

  • SHA256

    9cbe21e2c1e100dd5922bc7d4bc41c229ec2b89817ebbeecf739341bf8a22dcc

  • SHA512

    96b5945bb9feb68fd26c5777c8c40933ef1f1024dd9f85b51842e2a4fae493cb540ce47c6f70ca48d61327d9e779c35bc20ad74c85e80761aead0e5a44e5c6c5

  • SSDEEP

    3072:RViQlqzHI2Jdb6SyUMNdXoM5ivMZv3Wt:RV7qbJUFP4M8MF3Wt

Score
10/10

Malware Config

Extracted

Family

strela

C2

45.9.74.32

Attributes
  • url_path

    /out.php

  • user_agent

    Mozilla/4.0 (compatible)

Targets

    • Target

      9cbe21e2c1e100dd5922bc7d4bc41c229ec2b89817ebbeecf739341bf8a22dcc

    • Size

      123KB

    • MD5

      de38b8b5d76b00d21b67fbc39c32148b

    • SHA1

      eb61fbf95cc30bd2d7bf9848c5bd9052bdb8b815

    • SHA256

      9cbe21e2c1e100dd5922bc7d4bc41c229ec2b89817ebbeecf739341bf8a22dcc

    • SHA512

      96b5945bb9feb68fd26c5777c8c40933ef1f1024dd9f85b51842e2a4fae493cb540ce47c6f70ca48d61327d9e779c35bc20ad74c85e80761aead0e5a44e5c6c5

    • SSDEEP

      3072:RViQlqzHI2Jdb6SyUMNdXoM5ivMZv3Wt:RV7qbJUFP4M8MF3Wt

    Score
    10/10
    • Detects Strela Stealer payload

    • Strela stealer

      An info stealer targeting mail credentials first seen in late 2022.

MITRE ATT&CK Matrix

Tasks